General

  • Target

    PO81000383.exe

  • Size

    2.4MB

  • Sample

    231219-aq69yseagk

  • MD5

    204ec11e85fcce575b23f72bd6e80186

  • SHA1

    73f139ac70c956d0c9fcecbd680e8f91b94fcc44

  • SHA256

    d4a04769d4bd4b35a1e14846840667c4f949833d66a19791cde5f0024c33eed3

  • SHA512

    370f4a125919e7da1a02876c7b9bf386c9edc694a74bf7430ae644c8e62f309bb2c9ab4ea09e9039c28e3ec1b40d5af8345f5c50f32f0b7a3932e43553a4cb3c

  • SSDEEP

    49152:xrblclles9eZH2zPnkDg2ZI9FSdV7KczqM4b6FRATklR3I3FjPgfo:JilewDYWSLmcWpbaRATk/41cfo

Malware Config

Targets

    • Target

      PO81000383.exe

    • Size

      2.4MB

    • MD5

      204ec11e85fcce575b23f72bd6e80186

    • SHA1

      73f139ac70c956d0c9fcecbd680e8f91b94fcc44

    • SHA256

      d4a04769d4bd4b35a1e14846840667c4f949833d66a19791cde5f0024c33eed3

    • SHA512

      370f4a125919e7da1a02876c7b9bf386c9edc694a74bf7430ae644c8e62f309bb2c9ab4ea09e9039c28e3ec1b40d5af8345f5c50f32f0b7a3932e43553a4cb3c

    • SSDEEP

      49152:xrblclles9eZH2zPnkDg2ZI9FSdV7KczqM4b6FRATklR3I3FjPgfo:JilewDYWSLmcWpbaRATk/41cfo

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks