General

  • Target

    5ee0ad2cadeae99f1591b94f074ca2862a2724a5149ac1e22e1141065c60026a

  • Size

    575KB

  • Sample

    220701-dkxecabcb4

  • MD5

    87e1c4d0e0772a4a0bc909eb220f1f5e

  • SHA1

    e4ccaa82ff843727ff97030514c1fdf56fd7be40

  • SHA256

    5ee0ad2cadeae99f1591b94f074ca2862a2724a5149ac1e22e1141065c60026a

  • SHA512

    8c8e320cefd1898bca3d470d106c7999140ae21b1c39a672b0b6388a1f270e619a9ec4f2dd83a39126d0c3a72a12c6067eec867d5ee25a2a6462b3e414e26e3c

Malware Config

Extracted

Family

azorult

C2

http://voda.bit/a/index.php

Targets

    • Target

      5ee0ad2cadeae99f1591b94f074ca2862a2724a5149ac1e22e1141065c60026a

    • Size

      575KB

    • MD5

      87e1c4d0e0772a4a0bc909eb220f1f5e

    • SHA1

      e4ccaa82ff843727ff97030514c1fdf56fd7be40

    • SHA256

      5ee0ad2cadeae99f1591b94f074ca2862a2724a5149ac1e22e1141065c60026a

    • SHA512

      8c8e320cefd1898bca3d470d106c7999140ae21b1c39a672b0b6388a1f270e619a9ec4f2dd83a39126d0c3a72a12c6067eec867d5ee25a2a6462b3e414e26e3c

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks