General
-
Target
Payment Advice.r19
-
Size
163KB
-
Sample
210408-anjxzss3ra
-
MD5
d06d82eb45fff46d0cd9f1170f003c35
-
SHA1
2c0c95bfcaaed9bda73492e520f747ce4d7d0d4e
-
SHA256
8a8efbd50c1acdc4e7d99074ee89aa5de3c821814ae49d46c35de6ec037af0fe
-
SHA512
6588b6b5c62c44245fa01568bf621c00e556d6a1af5d20a88fa5444ae1005d695a8de04b93c684fae467ea45baf9d274228076a37bb0782d05d49fe58b3a6635
Static task
static1
Behavioral task
behavioral1
Sample
Payment Advice.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Payment Advice.exe
Resource
win10v20201028
Malware Config
Extracted
azorult
http://bengalcement.com.bd/AxPu/index.php
Targets
-
-
Target
Payment Advice.exe
-
Size
311KB
-
MD5
050fe32dbac2a40f18acdc43a8f6a31a
-
SHA1
25fcbceb5ada19e7637544ec5b6e2cd943bf169e
-
SHA256
eb7c92906b19491e5e670801cbcf189cf105f8e46a0e20c2bc8c7ab14cc1b9c7
-
SHA512
e97d1640a2ae33b585eae3079e95ea9c09cee2a57a338433a811986cbbe88cf2c14e04b9e4fff40ad98e7442b1dec9b940e590ca333cc3ed49a0a58cce0ae9a4
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-