General

  • Target

    halveringer jordnr.exe

  • Size

    611KB

  • Sample

    240917-hv4zdszgrr

  • MD5

    c49991e6b3f2f5325ccc013fe758d724

  • SHA1

    89421bf59eb12734b4ac73d78a566f8497f560b7

  • SHA256

    30e7a8d3ae31d83f3482b172d30306a26d953530453f0a3deb665546c130f939

  • SHA512

    678ccdb5d82f3a097df275399433437913c3070888eb95bf1b84e613b06a73927c00b36348b4e8a7d7d50900023a6d3f57f982aca3e590f3508d5410ca3af9d4

  • SSDEEP

    12288:XBIJsQwcwlMdgSd82LvbsGQzW+M6uOCCp:eJsQwcvgnEOK6wCp

Malware Config

Extracted

Family

azorult

C2

http://h8m5b.shop/HH341/index.php

Targets

    • Target

      halveringer jordnr.exe

    • Size

      611KB

    • MD5

      c49991e6b3f2f5325ccc013fe758d724

    • SHA1

      89421bf59eb12734b4ac73d78a566f8497f560b7

    • SHA256

      30e7a8d3ae31d83f3482b172d30306a26d953530453f0a3deb665546c130f939

    • SHA512

      678ccdb5d82f3a097df275399433437913c3070888eb95bf1b84e613b06a73927c00b36348b4e8a7d7d50900023a6d3f57f982aca3e590f3508d5410ca3af9d4

    • SSDEEP

      12288:XBIJsQwcwlMdgSd82LvbsGQzW+M6uOCCp:eJsQwcvgnEOK6wCp

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks