General

  • Target

    MD4170147SHP- TRF.exe

  • Size

    773KB

  • Sample

    231211-anbp9shde5

  • MD5

    5fb1817af0d04e7070006564d01824ca

  • SHA1

    9cbc6c05f67752fd5718af7deb0c19a4aa374686

  • SHA256

    f9eabd0f4a06e7878ae99fb9c5bedd90517780f91fdd559d5d3852823dab0573

  • SHA512

    31ba5f3c7956b053c0a9c49388c17568db22c1795ece54e59c528cacd213e8b1eae078589fd615bbb9b46eb95527c5b5fc7c1f7682c41b7c1ee39ecf07106f80

  • SSDEEP

    12288:lqwwbXXyWCpPJ3yvtK3PbybVVInOh3Uo/hyBfzj7ELAplrOeC/z3bAdQ:+LyWCpPetK/0VInsN4fv7EKrD+zLAdQ

Malware Config

Targets

    • Target

      MD4170147SHP- TRF.exe

    • Size

      773KB

    • MD5

      5fb1817af0d04e7070006564d01824ca

    • SHA1

      9cbc6c05f67752fd5718af7deb0c19a4aa374686

    • SHA256

      f9eabd0f4a06e7878ae99fb9c5bedd90517780f91fdd559d5d3852823dab0573

    • SHA512

      31ba5f3c7956b053c0a9c49388c17568db22c1795ece54e59c528cacd213e8b1eae078589fd615bbb9b46eb95527c5b5fc7c1f7682c41b7c1ee39ecf07106f80

    • SSDEEP

      12288:lqwwbXXyWCpPJ3yvtK3PbybVVInOh3Uo/hyBfzj7ELAplrOeC/z3bAdQ:+LyWCpPetK/0VInsN4fv7EKrD+zLAdQ

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks