General

  • Target

    062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe

  • Size

    1.5MB

  • Sample

    240726-p19kdsydmm

  • MD5

    52eac81cc6e67c2a28249295c6bcf3c5

  • SHA1

    9f8fba9b7b8404f02f4417169803d369a290910d

  • SHA256

    062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f

  • SHA512

    93109da7b23682f8d7432361cd0f09cf9b98d5b3bc2237fe786393b8e64424395a27888e036af494b129a00900250ff0e1d14e89925bafccc511eac1d52183c3

  • SSDEEP

    49152:dTvC/MTQYxsWR7acyejdjIQl6kX7sXf8n0irmNmSb6HCjsZ:RjTQYxsWR5yejdjIQl6kX7sXf8nzrm8l

Malware Config

Extracted

Family

azorult

C2

http://mhlc.shop/MC341/index.php

Targets

    • Target

      062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f.exe

    • Size

      1.5MB

    • MD5

      52eac81cc6e67c2a28249295c6bcf3c5

    • SHA1

      9f8fba9b7b8404f02f4417169803d369a290910d

    • SHA256

      062984754c78988300d9b2611b81c4f2c1bcae16380952c7ab550498b4249e3f

    • SHA512

      93109da7b23682f8d7432361cd0f09cf9b98d5b3bc2237fe786393b8e64424395a27888e036af494b129a00900250ff0e1d14e89925bafccc511eac1d52183c3

    • SSDEEP

      49152:dTvC/MTQYxsWR7acyejdjIQl6kX7sXf8n0irmNmSb6HCjsZ:RjTQYxsWR5yejdjIQl6kX7sXf8nzrm8l

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks