General

  • Target

    0975dfe2a1020973da450017c11dd4d80d809d33d6d6466bea55d8a95a7fc61d

  • Size

    721KB

  • Sample

    240525-w4jlpsde4w

  • MD5

    105609f1c44206a0a673b0154bba557b

  • SHA1

    cd5614eb62685994c29762432db505b998e7a181

  • SHA256

    0975dfe2a1020973da450017c11dd4d80d809d33d6d6466bea55d8a95a7fc61d

  • SHA512

    5b870490870cfab706eb65f2c0fd2f709c523b372749c11115ed8decd500cb97ea8d9e6d9080a70e9b665e132471af264a6bbdb089f48d816ac0964113d6446b

  • SSDEEP

    12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75L:arl6kD68JmloO7TdNaPymUi63i62xHLv

Malware Config

Extracted

Family

azorult

C2

http://185.79.156.23/j0n0/index.php

Targets

    • Target

      0975dfe2a1020973da450017c11dd4d80d809d33d6d6466bea55d8a95a7fc61d

    • Size

      721KB

    • MD5

      105609f1c44206a0a673b0154bba557b

    • SHA1

      cd5614eb62685994c29762432db505b998e7a181

    • SHA256

      0975dfe2a1020973da450017c11dd4d80d809d33d6d6466bea55d8a95a7fc61d

    • SHA512

      5b870490870cfab706eb65f2c0fd2f709c523b372749c11115ed8decd500cb97ea8d9e6d9080a70e9b665e132471af264a6bbdb089f48d816ac0964113d6446b

    • SSDEEP

      12288:DquErHF6xC9D6DmR1J98w4oknqOKw/zTd1RVaHvymUi6rjXrm62iU952aLovi75L:arl6kD68JmloO7TdNaPymUi63i62xHLv

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks