General

  • Target

    7c5bd51d549520223a57177f6dde2feea2a8e48077a36d73b1c96701360a68a6.exe

  • Size

    1.3MB

  • Sample

    240830-bzqt1a1bpf

  • MD5

    528d3ef48415f22bd277a9759d83a859

  • SHA1

    4ee7ed36eeaceca51e91952d25136f7260be6eab

  • SHA256

    7c5bd51d549520223a57177f6dde2feea2a8e48077a36d73b1c96701360a68a6

  • SHA512

    1409d17a7d5928e66b930401e04263a81a33623de404687c22824a177b879a6a4079d7256cd7e72433575662f62fea38a2fc9bad60d74ab88e5bf728fee6bd78

  • SSDEEP

    24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8a4YuX0JS44JZjwDPy6q6:GTvC/MTQYxsWR7andJSlZ2Py7

Malware Config

Extracted

Family

azorult

C2

http://ln6b9.shop/LN341/index.php

Targets

    • Target

      7c5bd51d549520223a57177f6dde2feea2a8e48077a36d73b1c96701360a68a6.exe

    • Size

      1.3MB

    • MD5

      528d3ef48415f22bd277a9759d83a859

    • SHA1

      4ee7ed36eeaceca51e91952d25136f7260be6eab

    • SHA256

      7c5bd51d549520223a57177f6dde2feea2a8e48077a36d73b1c96701360a68a6

    • SHA512

      1409d17a7d5928e66b930401e04263a81a33623de404687c22824a177b879a6a4079d7256cd7e72433575662f62fea38a2fc9bad60d74ab88e5bf728fee6bd78

    • SSDEEP

      24576:GqDEvCTbMWu7rQYlBQcBiT6rprG8a4YuX0JS44JZjwDPy6q6:GTvC/MTQYxsWR7andJSlZ2Py7

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks