General

  • Target

    45da35e12be2e8a17e6acf41f682c7f9.bin

  • Size

    620KB

  • Sample

    240831-bl3lmsxbpc

  • MD5

    84c0c55f94203e2372f66c7fcf15f835

  • SHA1

    3bb397c75f293617077d2e7d46d1103f6f105ab9

  • SHA256

    cbc0dbd8f8d4ce7ddc16424e958f5c472168163d47279cd153433599dd8dfe54

  • SHA512

    739f55c4f0f24311c4b39868ab735a1c5e586559333c4c4fdea4b80f0ed013df01183d4cd85cbc521f26116357db01f43806120b5cd6718cbeda30e12e0ec4aa

  • SSDEEP

    12288:RYGykX57Ou8a1By2seTBKvWmwZ/xx7/5euVFIvs8FLmbQQsNVJ:RYjkWMy4BKvhMZt8MK

Malware Config

Extracted

Family

azorult

C2

http://ln6b9.shop/LN341/index.php

Targets

    • Target

      4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74.exe

    • Size

      1.2MB

    • MD5

      45da35e12be2e8a17e6acf41f682c7f9

    • SHA1

      cdaccd6ed6bbc405666a5d06a9001d116153f56b

    • SHA256

      4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74

    • SHA512

      d6217abfd71bbe8e84a963a8cb399048f19f3a43aa8b820c2771502c6b4ff790458f22ef1e6c5d00bacd2ccf783da606d0b987169b1281b01dd920f5ad12d493

    • SSDEEP

      24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aiQi9co:STvC/MTQYxsWR7aiQiC

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks