General

  • Target

    3b56a17871edc0bbeaa64277877d4adeb1b3872e9e5e506e888244b13b3c374b

  • Size

    798KB

  • Sample

    220703-vbhy2abca2

  • MD5

    14ee6b16a392da9de8bbd6b0c029fbb1

  • SHA1

    6a0a3d9f8ac115f025e06b7088450361c91aa28f

  • SHA256

    3b56a17871edc0bbeaa64277877d4adeb1b3872e9e5e506e888244b13b3c374b

  • SHA512

    d2008e3ab5c563cff6addd368da684a922b27227ac97f2e5491030d2217fc78bbc3ff1137b2540dbcd9ca0f9cfd2852bb390349f82e502ad0914ea261d586316

Malware Config

Extracted

Family

azorult

C2

http://avebx.gq/ff1/index.php

Targets

    • Target

      3b56a17871edc0bbeaa64277877d4adeb1b3872e9e5e506e888244b13b3c374b

    • Size

      798KB

    • MD5

      14ee6b16a392da9de8bbd6b0c029fbb1

    • SHA1

      6a0a3d9f8ac115f025e06b7088450361c91aa28f

    • SHA256

      3b56a17871edc0bbeaa64277877d4adeb1b3872e9e5e506e888244b13b3c374b

    • SHA512

      d2008e3ab5c563cff6addd368da684a922b27227ac97f2e5491030d2217fc78bbc3ff1137b2540dbcd9ca0f9cfd2852bb390349f82e502ad0914ea261d586316

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE AZORult Variant.4 Checkin M2

      suricata: ET MALWARE AZORult Variant.4 Checkin M2

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M13

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M13

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M4

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M4

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks