General

  • Target

    270ccfd9fa5927e0dd36355f13d51ea5af5fe643c3cf22f374ca60ce6a73b7a5

  • Size

    552KB

  • Sample

    220616-gxshpsefcn

  • MD5

    88cab3e01e7d2274dd56a8d4b605cafb

  • SHA1

    d78df20a64aecb448521975d88360e5c9392cf2c

  • SHA256

    270ccfd9fa5927e0dd36355f13d51ea5af5fe643c3cf22f374ca60ce6a73b7a5

  • SHA512

    01ad52674350a68c461f284912a654514ca28fbf77cf1d99711e0df38e571fbca3d186f7ae0cfcf62fca135a09af6ecec481df014702605d07a8a542e39578d0

Malware Config

Extracted

Family

azorult

C2

http://cupononline.pk/index.php

Targets

    • Target

      270ccfd9fa5927e0dd36355f13d51ea5af5fe643c3cf22f374ca60ce6a73b7a5

    • Size

      552KB

    • MD5

      88cab3e01e7d2274dd56a8d4b605cafb

    • SHA1

      d78df20a64aecb448521975d88360e5c9392cf2c

    • SHA256

      270ccfd9fa5927e0dd36355f13d51ea5af5fe643c3cf22f374ca60ce6a73b7a5

    • SHA512

      01ad52674350a68c461f284912a654514ca28fbf77cf1d99711e0df38e571fbca3d186f7ae0cfcf62fca135a09af6ecec481df014702605d07a8a542e39578d0

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks