General

  • Target

    b43c38b648f6f242c023d744a3d4aced.exe

  • Size

    354KB

  • Sample

    231223-l43dpsegcj

  • MD5

    b43c38b648f6f242c023d744a3d4aced

  • SHA1

    c6044466c0f859645482f2565fad4854d0fbf586

  • SHA256

    cdb4f82771d838d1641a0749e9726ad77edcc91b7d34162da03f36a3d201df43

  • SHA512

    0e4c99addc2e9a9ad21cc20846204cca9c87f926b273738c0b4d39905a29cc07e69a1225321a75114fac6cb4c2c5a0f3d903ad15c0b157e2745889b0ac156866

  • SSDEEP

    6144:y0NUHxKsXA0NK8AMKaoMzPegiu083yPAaQZxRcSov3Rkee0SNyQjutzjKQ:y3bKmlXzGgiuByPA/ee0xj

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      b43c38b648f6f242c023d744a3d4aced.exe

    • Size

      354KB

    • MD5

      b43c38b648f6f242c023d744a3d4aced

    • SHA1

      c6044466c0f859645482f2565fad4854d0fbf586

    • SHA256

      cdb4f82771d838d1641a0749e9726ad77edcc91b7d34162da03f36a3d201df43

    • SHA512

      0e4c99addc2e9a9ad21cc20846204cca9c87f926b273738c0b4d39905a29cc07e69a1225321a75114fac6cb4c2c5a0f3d903ad15c0b157e2745889b0ac156866

    • SSDEEP

      6144:y0NUHxKsXA0NK8AMKaoMzPegiu083yPAaQZxRcSov3Rkee0SNyQjutzjKQ:y3bKmlXzGgiuByPA/ee0xj

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks