General

  • Target

    ada40662f6169f8784e227329378bb07770ccbfcbef2583ceadea68fb2b13639

  • Size

    3.3MB

  • Sample

    220701-eagrkscdh6

  • MD5

    cd3025f14f2f0415c73971d279b353b5

  • SHA1

    ad77e018e6a6f628606c4b5a9cabf3fe7c953bee

  • SHA256

    ada40662f6169f8784e227329378bb07770ccbfcbef2583ceadea68fb2b13639

  • SHA512

    7a4e85b9c28b06eb681ecbdb9cea7816924299080914dbdd3b1e372ae94d2dcc11694ca281944c177706c2e9b75ff644e41105ca2b97f0cfd7ea624d64c340ae

Malware Config

Extracted

Family

azorult

C2

http://217.8.117.24/FF621070-FFBC-431C-A6E3-E1BEAD7A3F09/index.php

Targets

    • Target

      ada40662f6169f8784e227329378bb07770ccbfcbef2583ceadea68fb2b13639

    • Size

      3.3MB

    • MD5

      cd3025f14f2f0415c73971d279b353b5

    • SHA1

      ad77e018e6a6f628606c4b5a9cabf3fe7c953bee

    • SHA256

      ada40662f6169f8784e227329378bb07770ccbfcbef2583ceadea68fb2b13639

    • SHA512

      7a4e85b9c28b06eb681ecbdb9cea7816924299080914dbdd3b1e372ae94d2dcc11694ca281944c177706c2e9b75ff644e41105ca2b97f0cfd7ea624d64c340ae

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • KPOT

      KPOT is an information stealer that steals user data and account credentials.

    • KPOT Core Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Tasks