General

  • Target

    SecuriteInfo.com.Trojan.PackedNET.1268.17112.6529.exe

  • Size

    149KB

  • Sample

    220922-rgqz2sfdfj

  • MD5

    889a5378723c2e9cae3e1f6fa311cf97

  • SHA1

    0b6fe411b6ee2ea8e3a6c55d4340cc878c16acaf

  • SHA256

    134488a4700a7deda589f0015dbd0c23a0cebd5b0a47d02c77cab3e8d4d0578b

  • SHA512

    62ef718abc123e91798ea896e659fcd9380a60545cae845236a3ac9e08cfcc1762643d30758f2e0e821f60e252ff29d19cd0432bbb6a8e7ccdbb0a4570cb9e90

  • SSDEEP

    3072:xDHXWDC5+OxWlCxcW4XHHAItj5MvuOFemKAHm:9gC5V0lJX/iFemG

Malware Config

Extracted

Family

azorult

C2

http://gwinaz.pro/PL341/index.php

Targets

    • Target

      SecuriteInfo.com.Trojan.PackedNET.1268.17112.6529.exe

    • Size

      149KB

    • MD5

      889a5378723c2e9cae3e1f6fa311cf97

    • SHA1

      0b6fe411b6ee2ea8e3a6c55d4340cc878c16acaf

    • SHA256

      134488a4700a7deda589f0015dbd0c23a0cebd5b0a47d02c77cab3e8d4d0578b

    • SHA512

      62ef718abc123e91798ea896e659fcd9380a60545cae845236a3ac9e08cfcc1762643d30758f2e0e821f60e252ff29d19cd0432bbb6a8e7ccdbb0a4570cb9e90

    • SSDEEP

      3072:xDHXWDC5+OxWlCxcW4XHHAItj5MvuOFemKAHm:9gC5V0lJX/iFemG

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks