General

  • Target

    c9f9cac249b944a81dcaf942997c774b267cd4b27d64318dd5d91583274098f1.exe

  • Size

    584KB

  • Sample

    241015-cltjeasgll

  • MD5

    7c79a1035c5735d3d0b304564a33ba1a

  • SHA1

    ecf62b17647c2db020119168e0eb12aa16984bc8

  • SHA256

    c9f9cac249b944a81dcaf942997c774b267cd4b27d64318dd5d91583274098f1

  • SHA512

    c86a3f3d311f1f512f4dda2dc768a85bbe5fd5473a62a0b9a1232490c656588e333a8906be2d2971fd39a6e389a211c886857a443b31a0a951b47c2f0b75229b

  • SSDEEP

    12288:Acir1S2IoOAc6/5rZGmy4nqpyZno/oPVPfvU7cwFG5jD/kGDnLTdfHaWAe5I/ZQw:Oqpy9ocVPfvU7s5jD/konvd/aWBuZnq0

Malware Config

Extracted

Family

azorult

C2

http://h8m5b.shop/ML341/index.php

Targets

    • Target

      c9f9cac249b944a81dcaf942997c774b267cd4b27d64318dd5d91583274098f1.exe

    • Size

      584KB

    • MD5

      7c79a1035c5735d3d0b304564a33ba1a

    • SHA1

      ecf62b17647c2db020119168e0eb12aa16984bc8

    • SHA256

      c9f9cac249b944a81dcaf942997c774b267cd4b27d64318dd5d91583274098f1

    • SHA512

      c86a3f3d311f1f512f4dda2dc768a85bbe5fd5473a62a0b9a1232490c656588e333a8906be2d2971fd39a6e389a211c886857a443b31a0a951b47c2f0b75229b

    • SSDEEP

      12288:Acir1S2IoOAc6/5rZGmy4nqpyZno/oPVPfvU7cwFG5jD/kGDnLTdfHaWAe5I/ZQw:Oqpy9ocVPfvU7s5jD/konvd/aWBuZnq0

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks