General

  • Target

    3e82b2bd3081a1c99fbedb271b00d06d8d48ad8a70466e919f7658cbf1d0d811

  • Size

    1.3MB

  • Sample

    220701-hxatbshbcp

  • MD5

    29388dce769f383980b9a67a30a2c9b2

  • SHA1

    e87e39b343f7c1de03a6ef7caba57d5d21d69211

  • SHA256

    3e82b2bd3081a1c99fbedb271b00d06d8d48ad8a70466e919f7658cbf1d0d811

  • SHA512

    e7450e193b83a389787af72fd7e2882825e84b2450512ee765ec0a57a82ce4da31eff287e2c9e761c76a0f0630cee91024c9290350575fe3cf61b9f22aee9679

Malware Config

Extracted

Family

azorult

C2

http://noveit.gq/0c1bs/index.php

Targets

    • Target

      3e82b2bd3081a1c99fbedb271b00d06d8d48ad8a70466e919f7658cbf1d0d811

    • Size

      1.3MB

    • MD5

      29388dce769f383980b9a67a30a2c9b2

    • SHA1

      e87e39b343f7c1de03a6ef7caba57d5d21d69211

    • SHA256

      3e82b2bd3081a1c99fbedb271b00d06d8d48ad8a70466e919f7658cbf1d0d811

    • SHA512

      e7450e193b83a389787af72fd7e2882825e84b2450512ee765ec0a57a82ce4da31eff287e2c9e761c76a0f0630cee91024c9290350575fe3cf61b9f22aee9679

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks