General

  • Target

    9491b6245a6dcb2bafb479f37f5b152e938951e876ae64165d6be864a4ddeec4

  • Size

    791KB

  • Sample

    220731-f8dm9acadm

  • MD5

    b7441f35bf7f1a035c9fd0fbdfd00f59

  • SHA1

    d4b4fe70f0f09475995642b5c0eb228a3ddc996e

  • SHA256

    9491b6245a6dcb2bafb479f37f5b152e938951e876ae64165d6be864a4ddeec4

  • SHA512

    505aaefbc0cd9d8275dceef23704946484f692aae51083df7e0ebf5f111d9d28538fb9df184d4ea65a0dad0ee377792041f8b9d662786ac0620e52a8ad9a497c

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      9491b6245a6dcb2bafb479f37f5b152e938951e876ae64165d6be864a4ddeec4

    • Size

      791KB

    • MD5

      b7441f35bf7f1a035c9fd0fbdfd00f59

    • SHA1

      d4b4fe70f0f09475995642b5c0eb228a3ddc996e

    • SHA256

      9491b6245a6dcb2bafb479f37f5b152e938951e876ae64165d6be864a4ddeec4

    • SHA512

      505aaefbc0cd9d8275dceef23704946484f692aae51083df7e0ebf5f111d9d28538fb9df184d4ea65a0dad0ee377792041f8b9d662786ac0620e52a8ad9a497c

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks