General

  • Target

    96efee488707bae35615acc56d007ac39a13046056f9c0e167466d50dafb7aff

  • Size

    998KB

  • Sample

    220701-d7sdxaaeaq

  • MD5

    5f6deb794f59490d8542b0afba28b612

  • SHA1

    c2ef5567e9d771f7e591ea9778ce24d2c6ead889

  • SHA256

    96efee488707bae35615acc56d007ac39a13046056f9c0e167466d50dafb7aff

  • SHA512

    ed331587f8017d65e4450754c5c2a15adfd21a435818df03ce05c0ad54adcf9cb1dc78a5b54467020c648135f694b4b26c3df1bd33427b76869c1badff44441f

Malware Config

Extracted

Family

azorult

C2

https://veegoo.com.sg/pics/index.php

Targets

    • Target

      96efee488707bae35615acc56d007ac39a13046056f9c0e167466d50dafb7aff

    • Size

      998KB

    • MD5

      5f6deb794f59490d8542b0afba28b612

    • SHA1

      c2ef5567e9d771f7e591ea9778ce24d2c6ead889

    • SHA256

      96efee488707bae35615acc56d007ac39a13046056f9c0e167466d50dafb7aff

    • SHA512

      ed331587f8017d65e4450754c5c2a15adfd21a435818df03ce05c0ad54adcf9cb1dc78a5b54467020c648135f694b4b26c3df1bd33427b76869c1badff44441f

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks