General

  • Target

    079f5422ec8e2d956f0533a2a1a62c0658453dbc2f1db0621f3b175ed2e46a21

  • Size

    153KB

  • Sample

    220531-bnlqxadfgr

  • MD5

    36185c10c8ccb627648067c8dc5d7e03

  • SHA1

    9b2435350859250371e00cd52a998f120724e088

  • SHA256

    079f5422ec8e2d956f0533a2a1a62c0658453dbc2f1db0621f3b175ed2e46a21

  • SHA512

    1b39ef0623fd1b830f6d1a68100059a7c9c33acfe27d2348ed942ca861edcf777545414436fc986157d5c1def2b3ec72eb6453849e888f49555536838918126f

Malware Config

Extracted

Family

azorult

C2

http://ymad.ug/1/index.php

Targets

    • Target

      079f5422ec8e2d956f0533a2a1a62c0658453dbc2f1db0621f3b175ed2e46a21

    • Size

      153KB

    • MD5

      36185c10c8ccb627648067c8dc5d7e03

    • SHA1

      9b2435350859250371e00cd52a998f120724e088

    • SHA256

      079f5422ec8e2d956f0533a2a1a62c0658453dbc2f1db0621f3b175ed2e46a21

    • SHA512

      1b39ef0623fd1b830f6d1a68100059a7c9c33acfe27d2348ed942ca861edcf777545414436fc986157d5c1def2b3ec72eb6453849e888f49555536838918126f

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks