General

  • Target

    5c51036817e7eba05b79b84972e6ae2c6991b4a4da004d5788ecb85f3c95db81

  • Size

    209KB

  • Sample

    220801-sc9f9sbbhn

  • MD5

    bea702ae53fc5c52131f58d5fefb79ca

  • SHA1

    d3e2d90f15a0813d22bcb8f34038b7e913345906

  • SHA256

    5c51036817e7eba05b79b84972e6ae2c6991b4a4da004d5788ecb85f3c95db81

  • SHA512

    fbe9de392834824895f42bfc70b92ac47d34c5420d74148a05c71550c89bb1de14d3b6cbc750519d6e44931ceef70bf984c1d85d1010d29ba3bd6a714e10837b

Malware Config

Extracted

Family

azorult

C2

http://ymad.ug/1/index.php

Targets

    • Target

      5c51036817e7eba05b79b84972e6ae2c6991b4a4da004d5788ecb85f3c95db81

    • Size

      209KB

    • MD5

      bea702ae53fc5c52131f58d5fefb79ca

    • SHA1

      d3e2d90f15a0813d22bcb8f34038b7e913345906

    • SHA256

      5c51036817e7eba05b79b84972e6ae2c6991b4a4da004d5788ecb85f3c95db81

    • SHA512

      fbe9de392834824895f42bfc70b92ac47d34c5420d74148a05c71550c89bb1de14d3b6cbc750519d6e44931ceef70bf984c1d85d1010d29ba3bd6a714e10837b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

MITRE ATT&CK Matrix

Tasks