General

  • Target

    25ccb0960098a629f504ab92bbccc1284e4c9f7e8708d16f0bd80e3316d251b2

  • Size

    721KB

  • Sample

    240523-ychansdf5x

  • MD5

    25f09a13c636b36703d69b9cf40c0b9f

  • SHA1

    91e762483965c663d575ab06d9a228d699669dc9

  • SHA256

    25ccb0960098a629f504ab92bbccc1284e4c9f7e8708d16f0bd80e3316d251b2

  • SHA512

    0bfcfff1d820efa3a9eb4e50954bef11e46bfa6aa396eda447c030e09bd3f4778307b0d24ecf07085ebe9267ebe043e1fc381ece43f87df5ced220c14b210da2

  • SSDEEP

    12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75I:arl6kD68JmloO7TdNaPymUi63i62xHLM

Malware Config

Extracted

Family

azorult

C2

http://185.79.156.23/j0n0/index.php

Targets

    • Target

      25ccb0960098a629f504ab92bbccc1284e4c9f7e8708d16f0bd80e3316d251b2

    • Size

      721KB

    • MD5

      25f09a13c636b36703d69b9cf40c0b9f

    • SHA1

      91e762483965c663d575ab06d9a228d699669dc9

    • SHA256

      25ccb0960098a629f504ab92bbccc1284e4c9f7e8708d16f0bd80e3316d251b2

    • SHA512

      0bfcfff1d820efa3a9eb4e50954bef11e46bfa6aa396eda447c030e09bd3f4778307b0d24ecf07085ebe9267ebe043e1fc381ece43f87df5ced220c14b210da2

    • SSDEEP

      12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75I:arl6kD68JmloO7TdNaPymUi63i62xHLM

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks