General

  • Target

    8ba6987bd8e765df43142f5b7803c88eccc85faf.exe

  • Size

    424KB

  • Sample

    221130-k9lsgaag3t

  • MD5

    a9b6246022869177cb7d66177b2bb480

  • SHA1

    8ba6987bd8e765df43142f5b7803c88eccc85faf

  • SHA256

    18f0eeec4de09ac329406c8a6cc99763015cf654ebc5404bb6150f6cf879bcb8

  • SHA512

    21ccb922e58aec1c1aac280e8335c925b4d0982286c97844590682729e6f33896076cf1dddac366ae466b78c2d02ad588241bc0b658072b6edcf78a363c419d5

  • SSDEEP

    6144:37ecOvI7EzEGRtx516Zkc3a6ZXGokcG1W9TwfpkkUnbPJUDlm4aaEt2GoyN6pB+H:r5CEI6Z9a6Is19Twfp6nDwlmXlw5wc4

Malware Config

Extracted

Family

azorult

C2

http://balaborka.com/index.php

Targets

    • Target

      8ba6987bd8e765df43142f5b7803c88eccc85faf.exe

    • Size

      424KB

    • MD5

      a9b6246022869177cb7d66177b2bb480

    • SHA1

      8ba6987bd8e765df43142f5b7803c88eccc85faf

    • SHA256

      18f0eeec4de09ac329406c8a6cc99763015cf654ebc5404bb6150f6cf879bcb8

    • SHA512

      21ccb922e58aec1c1aac280e8335c925b4d0982286c97844590682729e6f33896076cf1dddac366ae466b78c2d02ad588241bc0b658072b6edcf78a363c419d5

    • SSDEEP

      6144:37ecOvI7EzEGRtx516Zkc3a6ZXGokcG1W9TwfpkkUnbPJUDlm4aaEt2GoyN6pB+H:r5CEI6Z9a6Is19Twfp6nDwlmXlw5wc4

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks