General
-
Target
Refrence-Order#63729.pdf
-
Size
75KB
-
Sample
241002-rmqaps1akp
-
MD5
a0c8986f254942da6398f191ea2de509
-
SHA1
4e40a90768dfeff4c0cb4411a176bd7be68c9ac7
-
SHA256
cf5b009d36a4f45d435e3a10ac62c19fcbd161f69689589f8e9280735441da5c
-
SHA512
0eef50fd30c31b3c21abd04715c59126625bb9805ef377a75b0f0ef6abe0336d7e1273591455fe33bd13bc49577aa37257a7d0e664083365c2fac7d4d00565a1
-
SSDEEP
1536:ThWq0RfD6oBNp2XEgbyv2VCQ6zYkwvrAi2DSYbTBxQ7MOxjd/VcReDjslRvwG:VZ0RfmUNp2XEgbS2VezYkwvMxt8jxNVM
Behavioral task
behavioral1
Sample
Refrence-Order#63729.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Refrence-Order#63729.pdf
Resource
win10v2004-20240802-en
Malware Config
Extracted
azorult
http://h8m5b.shop/ML341/index.php
Targets
-
-
Target
Refrence-Order#63729.pdf
-
Size
75KB
-
MD5
a0c8986f254942da6398f191ea2de509
-
SHA1
4e40a90768dfeff4c0cb4411a176bd7be68c9ac7
-
SHA256
cf5b009d36a4f45d435e3a10ac62c19fcbd161f69689589f8e9280735441da5c
-
SHA512
0eef50fd30c31b3c21abd04715c59126625bb9805ef377a75b0f0ef6abe0336d7e1273591455fe33bd13bc49577aa37257a7d0e664083365c2fac7d4d00565a1
-
SSDEEP
1536:ThWq0RfD6oBNp2XEgbyv2VCQ6zYkwvrAi2DSYbTBxQ7MOxjd/VcReDjslRvwG:VZ0RfmUNp2XEgbS2VezYkwvMxt8jxNVM
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
7Credentials In Files
6Credentials in Registry
1