General

  • Target

    1a8921a7a0baedb853e8e618e81a372aafc403ac1961e3abe2740bf30c5e6aa2.exe

  • Size

    695KB

  • Sample

    231201-x1y3nafe32

  • MD5

    326165ea2344b35a9b7843a11227ad0f

  • SHA1

    b489a2479440f7f499485aeebfadcae2bc376c58

  • SHA256

    1a8921a7a0baedb853e8e618e81a372aafc403ac1961e3abe2740bf30c5e6aa2

  • SHA512

    e44ce87c170feb0065ef29e4d7d1fa591626d59af9f3a46202d8f5afc231b9615f1824b2ce6175f43139e55e808312df752f225b02ee3f02ffbf1024d6ada87c

  • SSDEEP

    12288:GcqMWxQR0RULXAhXmv58VBVInG3maeWySfiuQDipA11XFEjp5Nn0D/obmX:Gn+RMSAhXoGWG3m88X6jZ0D/J

Malware Config

Targets

    • Target

      1a8921a7a0baedb853e8e618e81a372aafc403ac1961e3abe2740bf30c5e6aa2.exe

    • Size

      695KB

    • MD5

      326165ea2344b35a9b7843a11227ad0f

    • SHA1

      b489a2479440f7f499485aeebfadcae2bc376c58

    • SHA256

      1a8921a7a0baedb853e8e618e81a372aafc403ac1961e3abe2740bf30c5e6aa2

    • SHA512

      e44ce87c170feb0065ef29e4d7d1fa591626d59af9f3a46202d8f5afc231b9615f1824b2ce6175f43139e55e808312df752f225b02ee3f02ffbf1024d6ada87c

    • SSDEEP

      12288:GcqMWxQR0RULXAhXmv58VBVInG3maeWySfiuQDipA11XFEjp5Nn0D/obmX:Gn+RMSAhXoGWG3m88X6jZ0D/J

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks