General

  • Target

    3b59e98809178eb374b0f07c205f2255b202173b3c1f4b3a916859c35b8dcb28

  • Size

    384KB

  • Sample

    220703-t8xb9abah4

  • MD5

    692921943e8230c6ea44054ce62212e5

  • SHA1

    2a993dde66f35c28ab94978f77e44e20750fc0c6

  • SHA256

    3b59e98809178eb374b0f07c205f2255b202173b3c1f4b3a916859c35b8dcb28

  • SHA512

    f383bd3f0edb667db7d432d99cddb0d7e352512156857f2bebe4439c9cb95aff1d9b3f65b213e11fa6c1996c7dad2c62b72247c6d7a9d7fe192cf1105d530f0e

Malware Config

Extracted

Family

azorult

C2

http://takememonky.tk/aye/index.php

Targets

    • Target

      3b59e98809178eb374b0f07c205f2255b202173b3c1f4b3a916859c35b8dcb28

    • Size

      384KB

    • MD5

      692921943e8230c6ea44054ce62212e5

    • SHA1

      2a993dde66f35c28ab94978f77e44e20750fc0c6

    • SHA256

      3b59e98809178eb374b0f07c205f2255b202173b3c1f4b3a916859c35b8dcb28

    • SHA512

      f383bd3f0edb667db7d432d99cddb0d7e352512156857f2bebe4439c9cb95aff1d9b3f65b213e11fa6c1996c7dad2c62b72247c6d7a9d7fe192cf1105d530f0e

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks