General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

  • Sample

    241229-dm6qss1jd1

Malware Config

Extracted

Family

azorult

C2

http://boglogov.site/index.php

Targets

    • Target

      https://github.com/Da2dalus/The-MALWARE-Repo

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Modifies WinLogon for persistence

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks