General

  • Target

    appicon.ico

  • Size

    3.5MB

  • Sample

    220808-swx8cacedm

  • MD5

    7e8b01de67c0391da2dd1997b8e2f649

  • SHA1

    70233d718878b78b32945e8f30cc4bb111542c85

  • SHA256

    59833bdf99c6e94235e386ce20c12647010e7de9a74356588b27a7e5fe4710ad

  • SHA512

    8f5c85c41d45381045d91def651d00639f0bdc3c86174fcf4e4d7ff1e1a9b872eb7001feb202000fec7047169ccb822e4d977b149c89f249b0dda127074b7511

Malware Config

Extracted

Family

azorult

C2

http://188.32.97.44/twitch/fk32nOPxf/index.php

Targets

    • Target

      appicon.ico

    • Size

      3.5MB

    • MD5

      7e8b01de67c0391da2dd1997b8e2f649

    • SHA1

      70233d718878b78b32945e8f30cc4bb111542c85

    • SHA256

      59833bdf99c6e94235e386ce20c12647010e7de9a74356588b27a7e5fe4710ad

    • SHA512

      8f5c85c41d45381045d91def651d00639f0bdc3c86174fcf4e4d7ff1e1a9b872eb7001feb202000fec7047169ccb822e4d977b149c89f249b0dda127074b7511

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks