Resubmissions

27/03/2025, 15:21

250327-srhbbstxgz 7

27/03/2025, 15:11

250327-skkswawly7 10

27/03/2025, 15:04

250327-sfpk9swlt4 10

27/03/2025, 14:57

250327-sb3mbstves 6

General

  • Target

    Slendytubbies 3 Multiplayer.exe

  • Size

    635KB

  • Sample

    250327-skkswawly7

  • MD5

    1fc40e19613ca683742edebb5678dc94

  • SHA1

    5b68b00678c56facd45ff7d8d50ce083a87508cb

  • SHA256

    a6d1246d2054da7e30d2d65a8f975b64fb162a501d5967fca963272927a3b41c

  • SHA512

    80192027ffcf1d6943ba4759051f9775ea22fc5c941530661762ac4fd8829ef9a584461c6c62ed1d2bcce4e65e28fc8d666d18cd7ec078fd80868be19122a0fc

  • SSDEEP

    6144:l/7oYfSHQPWTUg4LXY7Q64EXN4L/WnqPBfxB42AFnO0NFoN4ddddddN/dmMtDJ5w:p7qTUbXYs64UOPpMOKZW

Malware Config

Extracted

Family

azorult

C2

http://216.170.114.4/send/the/index.php

Targets

    • Target

      Slendytubbies 3 Multiplayer.exe

    • Size

      635KB

    • MD5

      1fc40e19613ca683742edebb5678dc94

    • SHA1

      5b68b00678c56facd45ff7d8d50ce083a87508cb

    • SHA256

      a6d1246d2054da7e30d2d65a8f975b64fb162a501d5967fca963272927a3b41c

    • SHA512

      80192027ffcf1d6943ba4759051f9775ea22fc5c941530661762ac4fd8829ef9a584461c6c62ed1d2bcce4e65e28fc8d666d18cd7ec078fd80868be19122a0fc

    • SSDEEP

      6144:l/7oYfSHQPWTUg4LXY7Q64EXN4L/WnqPBfxB42AFnO0NFoN4ddddddN/dmMtDJ5w:p7qTUbXYs64UOPpMOKZW

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • PrivateLoader

      PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

    • Privateloader family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks