General

  • Target

    20c677bfe746ef21cb647ec197118313

  • Size

    500KB

  • Sample

    231230-3y513shdcl

  • MD5

    20c677bfe746ef21cb647ec197118313

  • SHA1

    579f6027d4f2d2d26d0a66080b60f00069aad5a0

  • SHA256

    3a202ee1deaeda21a66a8de098965cdbd111b3a53c9ab85be0d282d9464c96c1

  • SHA512

    c5a276d717c19563a0391d3aa0d7d084334126b3bb9aae95fecacd1b0fa340060ce182b417120e82d92abd0c84f4cf51e94806a4443bc6ca6ecf77ea33c3e4a0

  • SSDEEP

    12288:9caIS4qCQ/s50L2ArSmPoPdAttEOpmysMkPQadTPxywtP:A7zXA2ArfPoP0tEOjsLPQuyC

Malware Config

Extracted

Family

azorult

C2

http://petcf.com/az/index.php

Targets

    • Target

      20c677bfe746ef21cb647ec197118313

    • Size

      500KB

    • MD5

      20c677bfe746ef21cb647ec197118313

    • SHA1

      579f6027d4f2d2d26d0a66080b60f00069aad5a0

    • SHA256

      3a202ee1deaeda21a66a8de098965cdbd111b3a53c9ab85be0d282d9464c96c1

    • SHA512

      c5a276d717c19563a0391d3aa0d7d084334126b3bb9aae95fecacd1b0fa340060ce182b417120e82d92abd0c84f4cf51e94806a4443bc6ca6ecf77ea33c3e4a0

    • SSDEEP

      12288:9caIS4qCQ/s50L2ArSmPoPdAttEOpmysMkPQadTPxywtP:A7zXA2ArfPoP0tEOjsLPQuyC

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks