General

  • Target

    e2e1b12c7250aa2dd317c5d3a8f6d491423383f56745507271dd5adb65edf92c

  • Size

    722KB

  • Sample

    240412-cw5dnafg4w

  • MD5

    88f4ca6e821b9d9a77e5035da148838b

  • SHA1

    2ac2303618384b14ebcc81a24fa8653973a4a754

  • SHA256

    e2e1b12c7250aa2dd317c5d3a8f6d491423383f56745507271dd5adb65edf92c

  • SHA512

    975f8fd31fabba2c3da3737d947e0ec5f2a9d797efbafde1d6e5b379dec2ed550f10fd5e1c551c061324806a044525196633527514ccf00fdda0a4711425dd53

  • SSDEEP

    12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75C:arl6kD68JmloO7TdNaPymUi63i62xHLu

Malware Config

Extracted

Family

azorult

C2

http://185.79.156.23/j0n0/index.php

Targets

    • Target

      e2e1b12c7250aa2dd317c5d3a8f6d491423383f56745507271dd5adb65edf92c

    • Size

      722KB

    • MD5

      88f4ca6e821b9d9a77e5035da148838b

    • SHA1

      2ac2303618384b14ebcc81a24fa8653973a4a754

    • SHA256

      e2e1b12c7250aa2dd317c5d3a8f6d491423383f56745507271dd5adb65edf92c

    • SHA512

      975f8fd31fabba2c3da3737d947e0ec5f2a9d797efbafde1d6e5b379dec2ed550f10fd5e1c551c061324806a044525196633527514ccf00fdda0a4711425dd53

    • SSDEEP

      12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75C:arl6kD68JmloO7TdNaPymUi63i62xHLu

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks