General

  • Target

    SecuriteInfo.com.Trojan.DownloaderNET.345.3695.17763.exe

  • Size

    327KB

  • Sample

    220930-xzxs7sfeam

  • MD5

    0fd8f449370d48311cb97ad8a7158210

  • SHA1

    c2750f18f27d6febf04f08a47e3d3e16f1cba3d9

  • SHA256

    295a65a8d806b7cb84d7b28e005b823aa5252501ac639293ebe330e0e151359d

  • SHA512

    d344942fd3fc712eaf68a2e37e896c2eba478fe9658c982a3a55d2d308c81f236e16a2328a063d713a99a8b93e763fdc23006c8b55aa9ae7aaa9e18789f19f3d

  • SSDEEP

    3072:tGhxNkMUgH1f55twxa/2FbnZk1Y+3hoOqOWE71hEbaFSkjiRrPwHqaq:tGhPLHExagZD+RoOq/a+

Malware Config

Extracted

Family

azorult

C2

http://kngpdrp.shop/PL341/index.php

Targets

    • Target

      SecuriteInfo.com.Trojan.DownloaderNET.345.3695.17763.exe

    • Size

      327KB

    • MD5

      0fd8f449370d48311cb97ad8a7158210

    • SHA1

      c2750f18f27d6febf04f08a47e3d3e16f1cba3d9

    • SHA256

      295a65a8d806b7cb84d7b28e005b823aa5252501ac639293ebe330e0e151359d

    • SHA512

      d344942fd3fc712eaf68a2e37e896c2eba478fe9658c982a3a55d2d308c81f236e16a2328a063d713a99a8b93e763fdc23006c8b55aa9ae7aaa9e18789f19f3d

    • SSDEEP

      3072:tGhxNkMUgH1f55twxa/2FbnZk1Y+3hoOqOWE71hEbaFSkjiRrPwHqaq:tGhPLHExagZD+RoOq/a+

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks