General

  • Target

    c5650ffbaba50c167a653d678efed5b1e643500a3916ee880e361c819bda147e

  • Size

    139KB

  • Sample

    220731-lxmpnsafd5

  • MD5

    928ccc36136faeaa99801bee029ced28

  • SHA1

    af0f3015c1bff40374c65e467f636f3ee26f50a4

  • SHA256

    c5650ffbaba50c167a653d678efed5b1e643500a3916ee880e361c819bda147e

  • SHA512

    09eba0f5b12ead9a63f603ed528e549afe9d3677ba732481b3608e394df3cc4b2ff4313a9b2e2551bcd419d8df4e103b1bb45659e4eb539da525aae720d7e873

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      c5650ffbaba50c167a653d678efed5b1e643500a3916ee880e361c819bda147e

    • Size

      139KB

    • MD5

      928ccc36136faeaa99801bee029ced28

    • SHA1

      af0f3015c1bff40374c65e467f636f3ee26f50a4

    • SHA256

      c5650ffbaba50c167a653d678efed5b1e643500a3916ee880e361c819bda147e

    • SHA512

      09eba0f5b12ead9a63f603ed528e549afe9d3677ba732481b3608e394df3cc4b2ff4313a9b2e2551bcd419d8df4e103b1bb45659e4eb539da525aae720d7e873

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks