General

  • Target

    Payment Details,pdf.rar

  • Size

    139KB

  • Sample

    220927-xrhdjsfchq

  • MD5

    c7f6d53661d5a8a9428bce65a5798baf

  • SHA1

    c57e623a283ae6322edd7401503a87cecd3392b9

  • SHA256

    8c53e524be0171151569a7cf09c8b990bfcd43af9743b4ed31a3d5016b18053a

  • SHA512

    1dbc8ae8274e807dc8370e955afff43801e54df4b9391692cba957d450693e0ad5dba506b251a13ca6eeff51a46061c348d186dbcfb4831a032c43f814d05bbd

  • SSDEEP

    3072:zdaxCbQgWg1dF7H6APSocYRu7lQJuOLYtnH128p4DxW+5cyfL5j:zdaxCbQKhD3qGk7ljZ1H1J4DxW+Pf1

Malware Config

Extracted

Family

azorult

C2

http://blsrs.shop/PL341/index.php

Targets

    • Target

      Payment Details,pdf.exe

    • Size

      321KB

    • MD5

      dd9aa37faba1afb315381ec81a5fe73b

    • SHA1

      f8b2cdd74a0f3fabde7eff5045202af4f1da9540

    • SHA256

      d5d3b0111c816adcf54d9913228c28d4f0923f902fdb58a8a0410eb39145f06f

    • SHA512

      423ba2e0b8d650ae13d360098d182fd58b56d4406295a31fbf740f583448f7d7c3a4b2e397376a9cae2923045571e8b8dd9a15f643e99364acec5be390ea29db

    • SSDEEP

      3072:PoYaziS8sdQtovkUSRys7IWzBekDNh8LqRyKmecUSRC+9wqY+mhhhmitqOT8q:gYuqov/Vs7jBb8LLKmUsCKi

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks