General

  • Target

    17d77e7b9938874054867fc880a9bf027cf6892549ce52ec6e5b8712fd3d0e67

  • Size

    683KB

  • Sample

    220916-stphesgah4

  • MD5

    39bd054598ed0c55109e078a0a7c6b28

  • SHA1

    8d2bbb0f85847bf5c2ac21be888c45798d07d718

  • SHA256

    17d77e7b9938874054867fc880a9bf027cf6892549ce52ec6e5b8712fd3d0e67

  • SHA512

    b6ae733c0def3f7c03a999b0e82d06b9707c69d0dbc052c2da19c076f0c3bfda30ffeeca2ecf82fa83a5cf1023d73c0b7674de07199638bcaf89df27e13010c7

  • SSDEEP

    12288:lxkC3AcQRP6U4vaM2HHxWSRiF/yLMgWFBa9/JUA+nqF77gqR7V2:9QLRCmH5iF6LMlBa9EnqN7bc

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      17d77e7b9938874054867fc880a9bf027cf6892549ce52ec6e5b8712fd3d0e67

    • Size

      683KB

    • MD5

      39bd054598ed0c55109e078a0a7c6b28

    • SHA1

      8d2bbb0f85847bf5c2ac21be888c45798d07d718

    • SHA256

      17d77e7b9938874054867fc880a9bf027cf6892549ce52ec6e5b8712fd3d0e67

    • SHA512

      b6ae733c0def3f7c03a999b0e82d06b9707c69d0dbc052c2da19c076f0c3bfda30ffeeca2ecf82fa83a5cf1023d73c0b7674de07199638bcaf89df27e13010c7

    • SSDEEP

      12288:lxkC3AcQRP6U4vaM2HHxWSRiF/yLMgWFBa9/JUA+nqF77gqR7V2:9QLRCmH5iF6LMlBa9EnqN7bc

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks