General

  • Target

    4568-139-0x0000000000400000-0x0000000000B79000-memory.dmp

  • Size

    7.5MB

  • Sample

    220808-s2ps6aegb3

  • MD5

    831c065e117796f799ae4c9d1e9941bf

  • SHA1

    5cb73d88f8ed8fe1b27e561be0282a62f388debd

  • SHA256

    9c9d64bed4ce8976fa554a56eafd023527dbdf3fe21e22f85667941c9bc8eb3d

  • SHA512

    a771748d0e09518f9eec1b58575ba72e45addb840034c6c2bcbdf9cee8f9a0bbc4891fa2a3ac02c009629f7469caa24976d8591ad0f913fd41434c9d4e8c7121

Malware Config

Extracted

Family

azorult

C2

http://188.32.97.44/twitch/fk32nOPxf/index.php

Targets

    • Target

      4568-139-0x0000000000400000-0x0000000000B79000-memory.dmp

    • Size

      7.5MB

    • MD5

      831c065e117796f799ae4c9d1e9941bf

    • SHA1

      5cb73d88f8ed8fe1b27e561be0282a62f388debd

    • SHA256

      9c9d64bed4ce8976fa554a56eafd023527dbdf3fe21e22f85667941c9bc8eb3d

    • SHA512

      a771748d0e09518f9eec1b58575ba72e45addb840034c6c2bcbdf9cee8f9a0bbc4891fa2a3ac02c009629f7469caa24976d8591ad0f913fd41434c9d4e8c7121

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks