General

  • Target

    QUOTATIONS10102022.exe

  • Size

    882KB

  • Sample

    221015-h7s3nafch6

  • MD5

    c81bfa6fceb066edf7ed02789826d026

  • SHA1

    9658d34de7857cc57eb7c9dd9a31386f23b62133

  • SHA256

    bb42af5051697b32214e007c7258386cfef013e0b14392e1b48a623d5106104c

  • SHA512

    0474c8ca862a91949b36a7f2e7f04073cfdf1bd70f3b7ea22c42c3a894cee8ae00ac5b7c27e995ece8ac95d33e25dabfd51e09a990819a4ad6c53d74b7acf421

  • SSDEEP

    12288:kTQO2iNFJ2uAV3O64+NDUqrIWeFIbCzuHg6VklrhT4FW9G7s:6D1Y1OP+NKxzuHNklrSW9Cs

Malware Config

Extracted

Family

azorult

C2

http://spursg.shop/spursg/index.php

Targets

    • Target

      QUOTATIONS10102022.exe

    • Size

      882KB

    • MD5

      c81bfa6fceb066edf7ed02789826d026

    • SHA1

      9658d34de7857cc57eb7c9dd9a31386f23b62133

    • SHA256

      bb42af5051697b32214e007c7258386cfef013e0b14392e1b48a623d5106104c

    • SHA512

      0474c8ca862a91949b36a7f2e7f04073cfdf1bd70f3b7ea22c42c3a894cee8ae00ac5b7c27e995ece8ac95d33e25dabfd51e09a990819a4ad6c53d74b7acf421

    • SSDEEP

      12288:kTQO2iNFJ2uAV3O64+NDUqrIWeFIbCzuHg6VklrhT4FW9G7s:6D1Y1OP+NKxzuHNklrSW9Cs

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks