General

  • Target

    af44fccdfe3d6e7f65283d47f4a121bd70000dbcf1d8d91aead1c124cd808554.exe

  • Size

    1.2MB

  • Sample

    240830-cg5e4stdnj

  • MD5

    bde0b7ff5003da14df7675564d5a8f6a

  • SHA1

    e72691a96a386c72392375969f0426361e167d3b

  • SHA256

    af44fccdfe3d6e7f65283d47f4a121bd70000dbcf1d8d91aead1c124cd808554

  • SHA512

    f1bdee98318083a64e6ad820e630cd9a39d6017eff13c7d5be86c66bab5f388111a48fbb1ffe2198ab6e915d4d1431ba06373404885cbde5ba186dfb78ac74cf

  • SSDEEP

    24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8a8cqly1Cs6wf:LTvC/MTQYxsWR7a8cqls

Malware Config

Extracted

Family

azorult

C2

http://ln6b9.shop/LN341/index.php

Targets

    • Target

      af44fccdfe3d6e7f65283d47f4a121bd70000dbcf1d8d91aead1c124cd808554.exe

    • Size

      1.2MB

    • MD5

      bde0b7ff5003da14df7675564d5a8f6a

    • SHA1

      e72691a96a386c72392375969f0426361e167d3b

    • SHA256

      af44fccdfe3d6e7f65283d47f4a121bd70000dbcf1d8d91aead1c124cd808554

    • SHA512

      f1bdee98318083a64e6ad820e630cd9a39d6017eff13c7d5be86c66bab5f388111a48fbb1ffe2198ab6e915d4d1431ba06373404885cbde5ba186dfb78ac74cf

    • SSDEEP

      24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8a8cqly1Cs6wf:LTvC/MTQYxsWR7a8cqls

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks