General

  • Target

    783144c09d0ad67a93db4ee29682d5f7.bin

  • Size

    648KB

  • Sample

    231213-cqntqaefgp

  • MD5

    783144c09d0ad67a93db4ee29682d5f7

  • SHA1

    f5ef789c9faa54e39fdf5392eb072f6f39fd6cab

  • SHA256

    5a2f52bb90ed8a2fd9bc0e07937684ac9b9389cdd112760f8dc96e16aa63d513

  • SHA512

    d04ab33c7d0988eb39ddf195c83e7da4b90166146937506b42182ae7d879cb0b050089b107c14cf13baf8e9243b890cb997532c19650b50a0a8d867faf503634

  • SSDEEP

    12288:9/AFryvwAQXTmWH33/cNLYziECbDv+soG5EHtGUjTN6BFi5Gu1JBMdmpsxz7p:9/AFAYmWH33/cNoit+s4NGaTN+bufBaL

Malware Config

Targets

    • Target

      Contract LPO SHEET #470168.exe

    • Size

      768KB

    • MD5

      fd6e71b54b99e511b6ee1d080b5704ad

    • SHA1

      2a30b0a671807d966b44d8c743413f82945adf78

    • SHA256

      46c4967e83a9a7f9cc87bceee586824640105f6bfddc89698684b374870023d9

    • SHA512

      aaeca03e8072c86474238351250329ceb505b77415c65a43404c586657b25a7c3cd71eec862fbf35b255aa48b23d70dad0ca6bf47d67ccf9c8681c3a3404e3d3

    • SSDEEP

      12288:+qwwbXXytzEDujljpEbPLJspWYBeDZFIi/c+o/hyBfzj7ELAplrOeC/z3bAdJv:NLytM2lSjY1DL4fv7EKrD+zLAd5

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks