General

  • Target

    56e33a58d357cebfd955a4ac11954244

  • Size

    370KB

  • Sample

    240112-teng9abgc9

  • MD5

    56e33a58d357cebfd955a4ac11954244

  • SHA1

    f32addf50c22d75bc7038729103b0be73079d326

  • SHA256

    45d374315146fd9f607cb90c11a0e2c5e6238b08061f0664c4da4c09a6f08e7f

  • SHA512

    bad07872817c43504366bc39ec7bd40848def6d17902c6e99323914ff2f13ac5d96c1e27da87fc75a0063c3f342e86dce7e42d9f20ea31893dfca98c60f76aa5

  • SSDEEP

    6144:AB1dni30i0w2qaaTErBYpf8pyTeF/hFxFWZmzLJveEUJZgLb49pxTVxWwMXnF/m+:aDnopTVx8pyEA6teRgLypz0w8nF/mp8J

Malware Config

Extracted

Family

azorult

C2

http://203.159.80.118/PL341/index.php

Targets

    • Target

      56e33a58d357cebfd955a4ac11954244

    • Size

      370KB

    • MD5

      56e33a58d357cebfd955a4ac11954244

    • SHA1

      f32addf50c22d75bc7038729103b0be73079d326

    • SHA256

      45d374315146fd9f607cb90c11a0e2c5e6238b08061f0664c4da4c09a6f08e7f

    • SHA512

      bad07872817c43504366bc39ec7bd40848def6d17902c6e99323914ff2f13ac5d96c1e27da87fc75a0063c3f342e86dce7e42d9f20ea31893dfca98c60f76aa5

    • SSDEEP

      6144:AB1dni30i0w2qaaTErBYpf8pyTeF/hFxFWZmzLJveEUJZgLb49pxTVxWwMXnF/m+:aDnopTVx8pyEA6teRgLypz0w8nF/mp8J

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks