General

  • Target

    2a077d4c2df732a080461ad5146bf3d1.bin

  • Size

    732KB

  • Sample

    241118-bharfszjak

  • MD5

    88f845a0c93a3f8b3f600375e3644f28

  • SHA1

    41514d4b6fe69ddff2fdbb474f48b9f369445ebe

  • SHA256

    9bce43972609b94012555ba306f2ed44515d628208a7a7598023c019e410d769

  • SHA512

    a316e8c14643938ac4ec271899302090990c007f5ad1e9e89da322211aa3a5277c557bdb4324dbc14b01a3720676c7e04ff2933e14395d08fbc1413dde2fbbff

  • SSDEEP

    12288:mlcMwRMDvjsF7YlQCREnnalYoUWh6ZO+sMeeEO4sPq7S:mlWeDvjsFmXCZpEO9PQS

Malware Config

Extracted

Family

azorult

C2

http://mhlc.shop/GI341/index.php

Targets

    • Target

      dc81b0022e759f55814fe1d7ecabc1fab64747313353016922b3e8b382b3f9c4.exe

    • Size

      830KB

    • MD5

      2a077d4c2df732a080461ad5146bf3d1

    • SHA1

      1b9f998daae540ba7067087dfbc2dbfe1b30daf3

    • SHA256

      dc81b0022e759f55814fe1d7ecabc1fab64747313353016922b3e8b382b3f9c4

    • SHA512

      28d89e74684ce26a36d6691c1aa41aa8d271ce6ce96b44a04487eff1d788ed148e211c6e411aa1999e32e7d74b427c0e1b0e5bc2786d03d590b4245b19af594d

    • SSDEEP

      24576:MvYV0HT73uFXyy4BAXtSnpsF7eFKwNiIqsYGnzs7G:HOzaUiXtmpsZeFKwNiIqs/

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      fc90dfb694d0e17b013d6f818bce41b0

    • SHA1

      3243969886d640af3bfa442728b9f0dff9d5f5b0

    • SHA256

      7fe77ca13121a113c59630a3dba0c8aaa6372e8082393274da8f8608c4ce4528

    • SHA512

      324f13aa7a33c6408e2a57c3484d1691ecee7c3c1366de2bb8978c8dc66b18425d8cab5a32d1702c13c43703e36148a022263de7166afdce141da2b01169f1c6

    • SSDEEP

      192:e/b2HS5ih/7i00eWz9T7PH6yeFcQMI5+Vw+EXWZ77dslFZk:ewSUmWw9T7MmnI5+/F7Kdk

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks