General

  • Target

    4cb2b6e2c86e81a6b2ddd2aca707e66a

  • Size

    696KB

  • Sample

    240108-25rxcsegcl

  • MD5

    4cb2b6e2c86e81a6b2ddd2aca707e66a

  • SHA1

    f13428a8ea50c72c6a24bd552804ab7a11428ec1

  • SHA256

    157e30e05a61154cbc5bb5e36dc43b33e500bd552f8a0624d3a02d9f1249665a

  • SHA512

    156e0c11011753cf46fd4817888c56294ab001c98fc32613e70104d9fd900be874baa30ac3bf5c09e7140eaf336b06f06e85568c7c6a7de0617f06e270048ce7

  • SSDEEP

    12288:PBSewDX45BRwe+paNLHwwowZfFeNXeDoxTAn9D22oDgylgIHbqx8:PBS0B+/aRHwwoXteE9An9yhDcI7qx8

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

oski

C2

gordonhk.ac.ug

Targets

    • Target

      4cb2b6e2c86e81a6b2ddd2aca707e66a

    • Size

      696KB

    • MD5

      4cb2b6e2c86e81a6b2ddd2aca707e66a

    • SHA1

      f13428a8ea50c72c6a24bd552804ab7a11428ec1

    • SHA256

      157e30e05a61154cbc5bb5e36dc43b33e500bd552f8a0624d3a02d9f1249665a

    • SHA512

      156e0c11011753cf46fd4817888c56294ab001c98fc32613e70104d9fd900be874baa30ac3bf5c09e7140eaf336b06f06e85568c7c6a7de0617f06e270048ce7

    • SSDEEP

      12288:PBSewDX45BRwe+paNLHwwowZfFeNXeDoxTAn9D22oDgylgIHbqx8:PBS0B+/aRHwwoXteE9An9yhDcI7qx8

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Detect ZGRat V1

    • Oski

      Oski is an infostealer targeting browser data, crypto wallets.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks