General

  • Target

    Counter_Strike_Condition_Zero_keygen_by_KeyGenGuru.zip

  • Size

    5.0MB

  • Sample

    241128-w44a4s1pbm

  • MD5

    e713d723cf5a4921e759e91da0a6fa55

  • SHA1

    fc04b230072f1d8b72b4cfe467b1e2cbeca485dc

  • SHA256

    2c967157a46689186cb95c4a2836314a3a3254aafcaffe515a97fc7fac077384

  • SHA512

    74e623212135ece90f61bc035bd42768647d8b3c3f50c0280494616858b464a8fea7853c18d6466360b93e567a454aad7be99376573561767506721dc94292ee

  • SSDEEP

    98304:vXLUSbC0r/LzHuET/he7GypeOQTUb5wou9E5pPA0EkzHgmnzaKHt3sIi:fLU2jy4/AppeOQTUFwFBDCAmnbtS

Malware Config

Extracted

Family

azorult

C2

http://upqx.ru/1210776429.php

Targets

    • Target

      Counter_Strike_Condition_Zero_keygen_by_KeyGenGuru.exe

    • Size

      5.1MB

    • MD5

      14f414538b77d7e57285695d87affc48

    • SHA1

      9dce4d5365b4e2af0a92e10959c25a1f692990fa

    • SHA256

      8202c32427de5ec0cc9bb0b4fa6a6615b7832540833e8bd29e2414a0a6b77f66

    • SHA512

      edcd2895fb00054c90799eed09ac7c5da68fc1f629ded4fcdee4bf1ade7a82a1c588274a2614183e34ff541e288b5c88cb855ff477e4d42f233d51a9cb91dbb5

    • SSDEEP

      98304:ehCRU/CzlX6MDpjZnHpUY0s/IcixUrEm0zoLJCQu5qFdTWE7CxDUgcgJPwudVQ:eh9sp1xrSIJFD0EwDUgv4ga

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      FILE_ID.DIZ

    • Size

      77B

    • MD5

      919d66bff717dc153f8969570d041066

    • SHA1

      25dbeb4e5791c3fbefe79040aaff79d5d613a792

    • SHA256

      162ff6f3ee99e27c34ffdc7467df2957337195829ea581bf758dc586f4f974a6

    • SHA512

      b33d946f459c7ae45cd93b09f940ab7b69a9c9f89dec8f477c042c338804b2c39e2501a287a78ba7aeedbaecb5f5139cad9f059e8ccf9ea92df577d5bb3f2a5e

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks