General

  • Target

    61d6ca8a21ef7c09e8e5a26c933338b99a94a086e47923cdb96201ada0d4cf30

  • Size

    1.0MB

  • Sample

    220730-ynq2ysegfj

  • MD5

    e5db0132a6945e6005a9dad8e7078624

  • SHA1

    971b19717dbf7a5fb4fe5e7ef4c6f6b19b8b8228

  • SHA256

    61d6ca8a21ef7c09e8e5a26c933338b99a94a086e47923cdb96201ada0d4cf30

  • SHA512

    e2a5d7c0dc12b6eec7e50f6e1a70a55e2b7ea63ae1ddc0a203460aef5cd497e11c5a7c8558458cbf2360d288cdd9c28715b5c681e7143d7dfcf682163cf30452

Malware Config

Extracted

Family

azorult

C2

http://cp73127.tmweb.ru/index.php

Targets

    • Target

      61d6ca8a21ef7c09e8e5a26c933338b99a94a086e47923cdb96201ada0d4cf30

    • Size

      1.0MB

    • MD5

      e5db0132a6945e6005a9dad8e7078624

    • SHA1

      971b19717dbf7a5fb4fe5e7ef4c6f6b19b8b8228

    • SHA256

      61d6ca8a21ef7c09e8e5a26c933338b99a94a086e47923cdb96201ada0d4cf30

    • SHA512

      e2a5d7c0dc12b6eec7e50f6e1a70a55e2b7ea63ae1ddc0a203460aef5cd497e11c5a7c8558458cbf2360d288cdd9c28715b5c681e7143d7dfcf682163cf30452

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks