General

  • Target

    0c3fba20ee8cf67d24cb54dafdfe07ce6178431ee03ea9a6b231e1a7656cb808.exe

  • Size

    768KB

  • Sample

    220521-yh2lhagcel

  • MD5

    91b4955eb63c2a420b419e89552116bb

  • SHA1

    f0e66386d6ed87bf3292a8951cb390f60437f29c

  • SHA256

    0c3fba20ee8cf67d24cb54dafdfe07ce6178431ee03ea9a6b231e1a7656cb808

  • SHA512

    57b49d4e54ff1881134865e477b8720b6d7796a64b6c9da875d8b577ebd79253da8b5df7b21e11e89c619f1e5ca33074848e9f739b34520e38027f4c0bf80b03

Malware Config

Extracted

Family

azorult

C2

http://37.0.11.56/razor/index.php

Targets

    • Target

      0c3fba20ee8cf67d24cb54dafdfe07ce6178431ee03ea9a6b231e1a7656cb808.exe

    • Size

      768KB

    • MD5

      91b4955eb63c2a420b419e89552116bb

    • SHA1

      f0e66386d6ed87bf3292a8951cb390f60437f29c

    • SHA256

      0c3fba20ee8cf67d24cb54dafdfe07ce6178431ee03ea9a6b231e1a7656cb808

    • SHA512

      57b49d4e54ff1881134865e477b8720b6d7796a64b6c9da875d8b577ebd79253da8b5df7b21e11e89c619f1e5ca33074848e9f739b34520e38027f4c0bf80b03

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks