General

  • Target

    5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8

  • Size

    1.7MB

  • Sample

    220731-zhz84sfed5

  • MD5

    746f7df0c1d2ff1c7c4fe90e3a24ae48

  • SHA1

    934a527ae8b8cdeaaf49b90193a9fcc1ae925854

  • SHA256

    5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8

  • SHA512

    533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6

Malware Config

Extracted

Family

azorult

C2

http://104.233.105.159/0/van/index.php

Targets

    • Target

      5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8

    • Size

      1.7MB

    • MD5

      746f7df0c1d2ff1c7c4fe90e3a24ae48

    • SHA1

      934a527ae8b8cdeaaf49b90193a9fcc1ae925854

    • SHA256

      5e4bbfd0a0ec4ad115e955ddc0219d0fdda191c9f95c3dadce2af567d9483fa8

    • SHA512

      533d48d3af681d8f9d14f97bcc3eeb99e07c3126c92de526b19e8045e839a70f5558fd35f669dd09eda08f14bc43cee40a060f964ff5f46b577ce8d98ca06de6

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks