General
-
Target
PO 652872-25.r10
-
Size
140KB
-
Sample
210407-czmksvtgbn
-
MD5
c489d50f8d8ff07afe94b9f0352ff308
-
SHA1
34462edd6e828ddcf038ff39b607bc56e299e10a
-
SHA256
32e3b41fa291113b9d722367452ba62c24b4abfaf0ead320d456ee3a1e3a855e
-
SHA512
489d3dd6e0cfc1e10316e8c5eb2ba54768f3a53953cca8d555bea8f9e540bacb6f21d1e9cbb62520b08003b081f88f51721bb583afa1022c841d567a0e4c9952
Static task
static1
Behavioral task
behavioral1
Sample
PO 652872-25.exe
Resource
win7v20201028
Malware Config
Extracted
azorult
http://lexusbiscuit.com/OiuBn/index.php
Targets
-
-
Target
PO 652872-25.exe
-
Size
151KB
-
MD5
70b20170f5fa182253a73b240d1a90bb
-
SHA1
6eb48005adb2e90d9baed892bc924b7cf101ab01
-
SHA256
0a7450cb96f770d928de20993e068930224a5b7314ca0c500f07a15b7adb19f4
-
SHA512
34fc1b3b20bb9c7b08fd72d075a51d68e19f45092186a516a6fa12a48e5870b277cb0f20b1d11bb744a268d96ecb4d4f1881565ea4c12b0251d8d52646ce789c
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-