General

  • Target

    AWB-BL DOCS.exe

  • Size

    537KB

  • Sample

    231123-ttm52aag39

  • MD5

    f2d6550bc426b58c63d87172cee52424

  • SHA1

    88f7c69eb8ba6e0d02fa94949bdf5641274ffa6d

  • SHA256

    aa17ccd48e6acc9b421bf8ad2441e7cd5cca6c856746c92441fac6cb95709aaf

  • SHA512

    17237724f15f7bd79d2affa935e566755b8beac91d120a25ccbd7089cd995ec7cc2c27519bf42b8844db870d7a0bd2b638ab0ee54bf1f5c526d76af519164882

  • SSDEEP

    12288:PDzHGJ9vnCOoCeogCE8LO6WjHkScxy7iVvyc:r6fvFoChE8LOVHj7Sb

Malware Config

Targets

    • Target

      AWB-BL DOCS.exe

    • Size

      537KB

    • MD5

      f2d6550bc426b58c63d87172cee52424

    • SHA1

      88f7c69eb8ba6e0d02fa94949bdf5641274ffa6d

    • SHA256

      aa17ccd48e6acc9b421bf8ad2441e7cd5cca6c856746c92441fac6cb95709aaf

    • SHA512

      17237724f15f7bd79d2affa935e566755b8beac91d120a25ccbd7089cd995ec7cc2c27519bf42b8844db870d7a0bd2b638ab0ee54bf1f5c526d76af519164882

    • SSDEEP

      12288:PDzHGJ9vnCOoCeogCE8LO6WjHkScxy7iVvyc:r6fvFoChE8LOVHj7Sb

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks