General

  • Target

    nkmvoXAz.bin.zip

  • Size

    59KB

  • Sample

    240817-qxmf5ayakh

  • MD5

    c05b9492d60de6c69f87e456584ce793

  • SHA1

    a51a80a440d1af2f6ba5bcc56e211b1643cdcb5d

  • SHA256

    4869058df68c8856d1d55d9fab7f5638eb30ec14f4266597261a5a2231ec7ef2

  • SHA512

    1584176227b88cd63ebaf70cf31c0498db610acf4b086c87bcdf0c7cb72ed0373f14ef5dfb0b54c58eb18d873b05603f92338b0a999a8c10a3f51f221df3ce1c

  • SSDEEP

    1536:I0JUb04JyaK2L1TRZsg5X/ToYtf3Op3VuZhqpM7acb:v2b0VF2Lqg5vUYd3OZVuZX+cb

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      nkmvoXAz.bin

    • Size

      112KB

    • MD5

      c5ace75580275c65cb6691c6ccb008a5

    • SHA1

      ed1339552e05b19b8c102b08622748eb4a691d4a

    • SHA256

      d110ab80a498526c2ea7c83cc8fb799887d49b50c2e7d7ea6e28654cc9d511e8

    • SHA512

      60d7933ceb1f876fbac26fb2acb851c88cdae3d20bf4cf9d3cede2668d11ede083df552bb28ec69267792e749166cec0a92efa86449ca5e44111657412839456

    • SSDEEP

      3072:KExRaQ6raoCoCyz6/mqv1JR+yBtGOeheWginyq:faO1tme+1wint

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

MITRE ATT&CK Enterprise v15

Tasks