General

  • Target

    9b9fd5ad54ba1aadc670fa4be3edab4ba8abca1b49880f57d4378320129c2f41

  • Size

    367KB

  • Sample

    241002-m8g41awhqd

  • MD5

    151925b02c36a765ffce463bde609709

  • SHA1

    2aeae165447f5ddde94c6eb0f988fd46bfff918e

  • SHA256

    9b9fd5ad54ba1aadc670fa4be3edab4ba8abca1b49880f57d4378320129c2f41

  • SHA512

    ae7dbbdae55e3653054d10a0f2c96b99ce48cfccae667f79ced5cdeb35ba5cecd3d674cbe1a9f1938a6e59c29f3897e0a8dd3134d078c34a7e2c8d4530161351

  • SSDEEP

    6144:mfAUPJqkXfWFLYUOHtbN8SykPDokpI75GyHfNS3f1AWPjxmDvTBCZhobpaaCqqL3:mTRXeFLxGR2ki7gQfUf1AWLxmDvTeKs5

Malware Config

Extracted

Family

azorult

C2

http://chr1zx.shop/ME341/index.php

Targets

    • Target

      PO for October.exe

    • Size

      505KB

    • MD5

      bf850cd7bd7cdfc2b21420ae5911fbaf

    • SHA1

      9b67f9d3e9319f9abd19686411884c441051e568

    • SHA256

      9576f740ace3c18ef6ab226e8c6ec41597af4d6b96ee8bc50861420cd7385193

    • SHA512

      02862973206b7a5c25d63a6b4f4f558a242ae8b7cbe698f1208d2cd2b048d1bd843b32b7b1823607134271e4d34128b04a114a80b481be2783af888dab7ae0fb

    • SSDEEP

      12288:ehSF4nneptwUHCQ9BelL91hiV0kqLFk0hyS2BjXGRKki7kQfwf1mWZxmDBVMayaE:ehvgdES41Lx4BSBnHt

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      dd87a973e01c5d9f8e0fcc81a0af7c7a

    • SHA1

      c9206ced48d1e5bc648b1d0f54cccc18bf643a14

    • SHA256

      7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1

    • SHA512

      4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f

    • SSDEEP

      192:VFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/993:97pJp48F2exrg5F/9

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks