General

  • Target

    a620e855497074b6da1cc6ae56b19c3e2e251f6a9b4f43bb0beef655287b3eed

  • Size

    324KB

  • Sample

    240226-1x3s8ahg6z

  • MD5

    e4eab1f4a61d788e9eed267c796e37f3

  • SHA1

    50736bccd6cff3401626b91e86b05f7fa68f9593

  • SHA256

    a620e855497074b6da1cc6ae56b19c3e2e251f6a9b4f43bb0beef655287b3eed

  • SHA512

    f31d00438435f5c6d1760fe3f8734b77c12b693ef025edb02968a715472c6093b880418bad4740122163d3a721a262f3b34c389b485903d6679ca73056980d98

  • SSDEEP

    6144:9UnAHUmzYAlVsgHn25LWYmBrWRpnahCX0AkROosFX3hOg6OKxkIPT9mXJ4ED:YLAlWgH2mBrWRpn+WkROocHhykt

Malware Config

Extracted

Family

azorult

C2

http://89.43.107.198/mpom/index.php

Targets

    • Target

      CITIUS33XXX10307051121001177.exe

    • Size

      337KB

    • MD5

      bce638f50587c46faa3c3e1798100251

    • SHA1

      7b354d3902b1af13cc17cf4ec0c4da111309956d

    • SHA256

      3b1fd9ce0c20b167a2367191a5129c5f635869f6a87f473cfe083e67d7f7465b

    • SHA512

      18445d9cd7bf41946817dae07652e2f4e9c0f14e98c90941c30b304fb70667aa79f4b5603f60d73bcd7bcca611bee7ac1d0601b278121c311de917b8e26e5c9f

    • SSDEEP

      6144:rGioWWuuTKFIIfn9pbghCwAehEPKb0iwRaazRZYJ:2uumFIWTbfZeEyIiYaeRZYJ

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • Target

      ucxgm.exe

    • Size

      179KB

    • MD5

      78673699f5e78cf7ecfbb9ef42f3cc20

    • SHA1

      7d1a1e230a595a3249f70871dfca54c1c7e6bb3e

    • SHA256

      85f2460b17088ffbf8a4cfbbcf8c65340f538fe7e78603cf03adad566afc7838

    • SHA512

      1f755d80bd66eea8ba8b0acbb9e2e8ba81d648671621ecd2407b680383e94269f7668840c9280dd75e176efb05cff25345438b43d3e82d71d9df865d759bb016

    • SSDEEP

      3072:LRkMxoi0pXe9X11yHJqkc3xKLYBbIseNfIdQyQ+/vozm:LRcXe11oHJqlEbOR

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks