General

  • Target

    c315549695f476577946114e2531f1eae8f655a4e51a15f05f83d660deecf32b

  • Size

    721KB

  • Sample

    220701-dnw8rabdd3

  • MD5

    a35807cd90bbe720b896c6d1fdef5565

  • SHA1

    1d6dd018476fe1b263102957b4d2962bd4f59c47

  • SHA256

    c315549695f476577946114e2531f1eae8f655a4e51a15f05f83d660deecf32b

  • SHA512

    245dab8ed5049f0c36ab2538a879624e30a3801ff61bf8d1801fcc3beb61f6790e5325a7c24af449d07f6eb0ea464e70a0c57a9f21cd7b77b0616f6a41486b21

Malware Config

Extracted

Family

azorult

C2

http://mikeservers.eu/kingz/index.php

Targets

    • Target

      c315549695f476577946114e2531f1eae8f655a4e51a15f05f83d660deecf32b

    • Size

      721KB

    • MD5

      a35807cd90bbe720b896c6d1fdef5565

    • SHA1

      1d6dd018476fe1b263102957b4d2962bd4f59c47

    • SHA256

      c315549695f476577946114e2531f1eae8f655a4e51a15f05f83d660deecf32b

    • SHA512

      245dab8ed5049f0c36ab2538a879624e30a3801ff61bf8d1801fcc3beb61f6790e5325a7c24af449d07f6eb0ea464e70a0c57a9f21cd7b77b0616f6a41486b21

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks