General

  • Target

    d896b950e9f01c31e0b75d202afddd32.bin

  • Size

    1.8MB

  • Sample

    231221-dqxbjafedl

  • MD5

    71350593f1dc319e39287cf7ecdc9300

  • SHA1

    33c9b7799a002e250676bb3aa6b5483b29910905

  • SHA256

    8fd35805c95b86fa902d35a1bd428be4cf3cbe108f3dbc4596a1dac56d7da145

  • SHA512

    dd367d2c273cd728a06ad77a7c4d22a08256ec820ee6afc8d0ae6a4037b1ecb596687e353ed4b4eecde5a08ea75f6db8b28d9a81873c79f853bec35181758229

  • SSDEEP

    24576:7OZyUGAolOW57Rowv8ZR9h9jKj3NtjUgHkaPzhLe3DoX3WX4ifGydztV+xbsaFml:qZykyOW5+y3vIgpB+4q44+ZsaT9AbX

Malware Config

Targets

    • Target

      aba7133b1ccdb78338fe271d73689bac4f40251b8fc194a9b86253a71e4017cc.exe

    • Size

      1.8MB

    • MD5

      d896b950e9f01c31e0b75d202afddd32

    • SHA1

      de7e0b58b1f4a3fb13e6edbfede523741279a326

    • SHA256

      aba7133b1ccdb78338fe271d73689bac4f40251b8fc194a9b86253a71e4017cc

    • SHA512

      e5a4665e2b844043b6e0ad72d469ea390d7346baea4951cfe691ed76da1a03d69ef613d6d8aa44f91f5d101b012224a23f6869416eb50ab4c618826e415f747c

    • SSDEEP

      49152:gaC9+JjVSDF9S2/b84qn+gNZojiQ/7RUImQTIuGB32lf:g9AVQDxb8nJZo//Vt9G92lf

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks