General

  • Target

    4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe

  • Size

    501KB

  • Sample

    220521-yhz3nsgccn

  • MD5

    7860c138e3b8f40bfb6efec08f4a4068

  • SHA1

    28718036a0ff9ecd92e794cefc429f3d4aea7ba1

  • SHA256

    4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c

  • SHA512

    71686bdfa1d10e50ee82374dfde16c45b3bc338065f24e3f5f68ddf984ba6a97624e88f147183c9f3874d14725d75e236d0c209d3eb5d924e9dff3ac1815f620

Malware Config

Extracted

Family

azorult

C2

http://crevisoft.net/images/backgrounds/ob/index.php

Targets

    • Target

      4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c.exe

    • Size

      501KB

    • MD5

      7860c138e3b8f40bfb6efec08f4a4068

    • SHA1

      28718036a0ff9ecd92e794cefc429f3d4aea7ba1

    • SHA256

      4f65afff4bbaee37d797d5f695d78412a53221a6d1c0fd80d750648df039ff5c

    • SHA512

      71686bdfa1d10e50ee82374dfde16c45b3bc338065f24e3f5f68ddf984ba6a97624e88f147183c9f3874d14725d75e236d0c209d3eb5d924e9dff3ac1815f620

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE AZORult Variant.4 Checkin M2

      suricata: ET MALWARE AZORult Variant.4 Checkin M2

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M5

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M5

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks