General

  • Target

    New order sample PO7893.exe

  • Size

    203KB

  • Sample

    221020-p4mvsseee8

  • MD5

    2a8fa542770569a06539813dfd9e8c40

  • SHA1

    efa9765d341e9ea895b6fd4d3838cff01630db56

  • SHA256

    4b75f9894973d58acb790a449425a31c1494be099fbe574d2ff29ffab171d119

  • SHA512

    ed43e73bd8a1ca0e75e97b959c011675bd215f1df06b782a956f6591c5e2952f54b0cd6042e03a7234459431916312a7477b4aab6cf14aa5cf8814e5a65aa1b3

  • SSDEEP

    3072:zf065+tl8PtVWa50X714vwtW44XX6AM53TSoHH6CCNH0/2jMujgDPYF4SSoWq2tS:b0xkYec6C2U/2aDg9WBU/

Malware Config

Extracted

Family

azorult

C2

http://bl4t1t2.shop/bl4t1t2/index.php

Targets

    • Target

      New order sample PO7893.exe

    • Size

      203KB

    • MD5

      2a8fa542770569a06539813dfd9e8c40

    • SHA1

      efa9765d341e9ea895b6fd4d3838cff01630db56

    • SHA256

      4b75f9894973d58acb790a449425a31c1494be099fbe574d2ff29ffab171d119

    • SHA512

      ed43e73bd8a1ca0e75e97b959c011675bd215f1df06b782a956f6591c5e2952f54b0cd6042e03a7234459431916312a7477b4aab6cf14aa5cf8814e5a65aa1b3

    • SSDEEP

      3072:zf065+tl8PtVWa50X714vwtW44XX6AM53TSoHH6CCNH0/2jMujgDPYF4SSoWq2tS:b0xkYec6C2U/2aDg9WBU/

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks