General
-
Target
HSBC_Payment.exe
-
Size
622KB
-
Sample
240925-g9hh9stale
-
MD5
a1b6b44f97ac8e1efd21bd9fa5abe56d
-
SHA1
2f56cfe23e6524d8ee0e33772c4c4e5ae2e74885
-
SHA256
a567fb9318d264cc80e334cef437c32da976282553a292df76899ac7410f4503
-
SHA512
2ff995bba25e85e11b59f19ef50332bec8e8603af5d95a9d2d6a4ca0b0bafdc8f1654a8dc9580d1b61040c2b064355a7dfd65f51faca2698095d13e8ae780d55
-
SSDEEP
6144:vYa6vEsNe5YZ0thEQfEkJSgC7M/1RuCt/Po7U8Mq3n39D3nEkxVPaEnIW2KkR4hV:vY+T5LbpJS1M/OlbMgn39DXVfPa62K66
Static task
static1
Behavioral task
behavioral1
Sample
HSBC_Payment.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HSBC_Payment.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
azorult
http://l0h5.shop/UO341/index.php
Targets
-
-
Target
HSBC_Payment.exe
-
Size
622KB
-
MD5
a1b6b44f97ac8e1efd21bd9fa5abe56d
-
SHA1
2f56cfe23e6524d8ee0e33772c4c4e5ae2e74885
-
SHA256
a567fb9318d264cc80e334cef437c32da976282553a292df76899ac7410f4503
-
SHA512
2ff995bba25e85e11b59f19ef50332bec8e8603af5d95a9d2d6a4ca0b0bafdc8f1654a8dc9580d1b61040c2b064355a7dfd65f51faca2698095d13e8ae780d55
-
SSDEEP
6144:vYa6vEsNe5YZ0thEQfEkJSgC7M/1RuCt/Po7U8Mq3n39D3nEkxVPaEnIW2KkR4hV:vY+T5LbpJS1M/OlbMgn39DXVfPa62K66
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
7Credentials In Files
6Credentials in Registry
1