General

  • Target

    zbot.zip

  • Size

    598KB

  • Sample

    221006-3kft2abchl

  • MD5

    fac941eefc8571e51aef69289b5903c4

  • SHA1

    8c8f78a4adde292997ca9bf49ee1c3f98594fc0e

  • SHA256

    7c4b46f3e0a2b29fe0f5d54547e940fc35fb8977631306083b41bcd00585e08c

  • SHA512

    08926512cb9cd98d18bfe25be04a7ea7c790471c055b7768d0f26c0a75e75105d0c048347708c625dc54e11a2dec202219bb5583ddd3a383b91b2d59d9cff5b3

  • SSDEEP

    12288:Zmf6pqqRBjtWf+TaHsGNHY7XUvbsNrvCnX6k+pRyue41Hh0+D7v+:Rbs4aMG5ezNrvi+p/bdtDa

Malware Config

Extracted

Family

azorult

C2

http://188.209.52.233/gate.php

Targets

    • Target

      a5bb96d731ef58cf17cc579578ab89c7c46f275982be8eb137ff64268dff1efc

    • Size

      616KB

    • MD5

      1833589c607ac469b174b2814369ce61

    • SHA1

      cf9f0075bab1121727670149313ad19b4bdd5329

    • SHA256

      a5bb96d731ef58cf17cc579578ab89c7c46f275982be8eb137ff64268dff1efc

    • SHA512

      66d1b289bb81468a12b105cfc6af6c3ca4ee5f8fdd784604b1153c78fbcd79313374aa29a1b5822d2c5d65df9cc06e43468d1b91c2037e5b0f162e9165d4cf93

    • SSDEEP

      12288:K+KCarVlx6yaKbODxUazPGQoK0dGM0mIf/NLOs9FWGVMD0Fg5X4Un:K+KCapKaUx0K4ILOEWGVMIi5X4Un

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks