General
-
Target
df81d775612d1565e5564d416420c2fd.exe
-
Size
1004KB
-
Sample
210216-rg7x6jnwre
-
MD5
df81d775612d1565e5564d416420c2fd
-
SHA1
49252eae3983eaa89eea12b5f5b65c5e147d3e5b
-
SHA256
d98fd8189273e4f4fcbb8b1d5b32459b5d7adcd6eaff9efef0c32ace0fdfab0e
-
SHA512
a20e59cff9cd30efa06a5bb5c935d119e19d74f289d22335173e64046c634c4ed2b87db5b0e774c90d87c0b34686b4a7e4a9ff8e3e9c8d56207ccc6146ff03d9
Static task
static1
Behavioral task
behavioral1
Sample
df81d775612d1565e5564d416420c2fd.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
df81d775612d1565e5564d416420c2fd.exe
Resource
win10v20201028
Malware Config
Extracted
raccoon
8e94b823a9991735de58978b0e8609a618f8ddd3
-
url4cnc
https://tttttt.me/brikitiki
Extracted
oski
hanxlas.ac.ug
Extracted
azorult
http://195.245.112.115/index.php
Extracted
asyncrat
0.5.7B
icando.ug:6970
icacxndo.ac.ug:6970
6SI8OkPnkxzcasd
-
aes_key
rkDO6u9Rg2tQZ5crWRxI7ttwjOqPWDog
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
XX
-
host
icando.ug,icacxndo.ac.ug
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
6SI8OkPnkxzcasd
-
pastebin_config
null
-
port
6970
-
version
0.5.7B
Targets
-
-
Target
df81d775612d1565e5564d416420c2fd.exe
-
Size
1004KB
-
MD5
df81d775612d1565e5564d416420c2fd
-
SHA1
49252eae3983eaa89eea12b5f5b65c5e147d3e5b
-
SHA256
d98fd8189273e4f4fcbb8b1d5b32459b5d7adcd6eaff9efef0c32ace0fdfab0e
-
SHA512
a20e59cff9cd30efa06a5bb5c935d119e19d74f289d22335173e64046c634c4ed2b87db5b0e774c90d87c0b34686b4a7e4a9ff8e3e9c8d56207ccc6146ff03d9
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-