General

  • Target

    3c020a1e304915e460a8b1524dacbaac804b9753d3d0fc36d34ded0e3baefb02

  • Size

    1.8MB

  • Sample

    220703-kvz2jscfhq

  • MD5

    b6c77f545813f551ac34090023543a28

  • SHA1

    974ac311cc5effc58bc911f4da286bc77884fab4

  • SHA256

    3c020a1e304915e460a8b1524dacbaac804b9753d3d0fc36d34ded0e3baefb02

  • SHA512

    37f6f90e58010e21fa08b3a3522fe6756b8a93a31c46c5fec12457d70de61b8dad754b1e5dc99c44c4c301365bb0eb7ef577c82549349b54902c1f760e8feb36

Malware Config

Extracted

Family

azorult

C2

http://begurtyut.info/743862/index.php

Targets

    • Target

      3c020a1e304915e460a8b1524dacbaac804b9753d3d0fc36d34ded0e3baefb02

    • Size

      1.8MB

    • MD5

      b6c77f545813f551ac34090023543a28

    • SHA1

      974ac311cc5effc58bc911f4da286bc77884fab4

    • SHA256

      3c020a1e304915e460a8b1524dacbaac804b9753d3d0fc36d34ded0e3baefb02

    • SHA512

      37f6f90e58010e21fa08b3a3522fe6756b8a93a31c46c5fec12457d70de61b8dad754b1e5dc99c44c4c301365bb0eb7ef577c82549349b54902c1f760e8feb36

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks