General

  • Target

    2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia

  • Size

    331KB

  • Sample

    250216-cx6ywaxqhx

  • MD5

    5b692034c8d92d39d0dce48a26023190

  • SHA1

    75476d84efa525812ad90774a00b8f02ae4c88d8

  • SHA256

    3399fa00813d7df440adaedb1817cbbec28e303fdffc46191e6415ad20c78b94

  • SHA512

    d58cf25b6729a6bbd31096e89b4dab2ff2c07da4d2da23e27268f1bf03e9a5ba184d39a96d2e157666d4c583a7c26f984d6f46a48b1b3cd010604aa5da6070b5

  • SSDEEP

    6144:cu4PqtlK7KWQhbrsKaFnlHDqwRBbRCgf0BabAYviFsJyAFtHet:iPq/K7KWmrsKunhDfCsriqxve

Malware Config

Extracted

Family

azorult

C2

http://jinf43ufm0edurygk49.bit/ak3nzor93jne93kwp/index.php

Targets

    • Target

      2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia

    • Size

      331KB

    • MD5

      5b692034c8d92d39d0dce48a26023190

    • SHA1

      75476d84efa525812ad90774a00b8f02ae4c88d8

    • SHA256

      3399fa00813d7df440adaedb1817cbbec28e303fdffc46191e6415ad20c78b94

    • SHA512

      d58cf25b6729a6bbd31096e89b4dab2ff2c07da4d2da23e27268f1bf03e9a5ba184d39a96d2e157666d4c583a7c26f984d6f46a48b1b3cd010604aa5da6070b5

    • SSDEEP

      6144:cu4PqtlK7KWQhbrsKaFnlHDqwRBbRCgf0BabAYviFsJyAFtHet:iPq/K7KWmrsKunhDfCsriqxve

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Downloads MZ/PE file

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks