General

  • Target

    8F391DB2FC8B0C6BE72425CD5E8F8369.exe

  • Size

    962KB

  • Sample

    240908-dwbl1svdlf

  • MD5

    8f391db2fc8b0c6be72425cd5e8f8369

  • SHA1

    c94fa3368eb4946aad49c82a613d3cbe40266a60

  • SHA256

    856d0a974a7e4eefc2d79baaf9ff34aacc6cf0f721804299fbff8d90c661e190

  • SHA512

    8c65188147f98b7142cde942401cc2ff4cac58eb087e9f4830b62a8770a8a2606d4d2cd565c916c20dffdabfd3ede441d7c64cdafb45b38ee71b4f410f3a006b

  • SSDEEP

    24576:eAHnh+eWsN3skA4RV1Hom2KXMmHasDoW7nuf5:Jh+ZkldoPK8YasEWK

Malware Config

Extracted

Family

azorult

C2

http://k6j8.shop/OY341/index.php

Targets

    • Target

      8F391DB2FC8B0C6BE72425CD5E8F8369.exe

    • Size

      962KB

    • MD5

      8f391db2fc8b0c6be72425cd5e8f8369

    • SHA1

      c94fa3368eb4946aad49c82a613d3cbe40266a60

    • SHA256

      856d0a974a7e4eefc2d79baaf9ff34aacc6cf0f721804299fbff8d90c661e190

    • SHA512

      8c65188147f98b7142cde942401cc2ff4cac58eb087e9f4830b62a8770a8a2606d4d2cd565c916c20dffdabfd3ede441d7c64cdafb45b38ee71b4f410f3a006b

    • SSDEEP

      24576:eAHnh+eWsN3skA4RV1Hom2KXMmHasDoW7nuf5:Jh+ZkldoPK8YasEWK

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks