General
-
Target
b019b145a52839e1a6a2556a5868c63807cc4c57581e79033b4c994bd372bfd2.exe
-
Size
570KB
-
Sample
210418-bgfrsenala
-
MD5
0b992fdb4359bb2b25f78b8bd4e658c7
-
SHA1
20c5824d7067357c044cc85ec2f2cdd7e919e959
-
SHA256
b019b145a52839e1a6a2556a5868c63807cc4c57581e79033b4c994bd372bfd2
-
SHA512
09bea997e97dc8a46ded29d5f59a990b26aa8031b7dcf5248f68d7f1053cabc4cda4a5cadf78af8fa0d0f3645dc255ec4473f60e98426229d9f04edb05bed1fe
Static task
static1
Behavioral task
behavioral1
Sample
b019b145a52839e1a6a2556a5868c63807cc4c57581e79033b4c994bd372bfd2.exe
Resource
win7v20210408
Malware Config
Extracted
azorult
http://173.230.150.192/index.php
Targets
-
-
Target
b019b145a52839e1a6a2556a5868c63807cc4c57581e79033b4c994bd372bfd2.exe
-
Size
570KB
-
MD5
0b992fdb4359bb2b25f78b8bd4e658c7
-
SHA1
20c5824d7067357c044cc85ec2f2cdd7e919e959
-
SHA256
b019b145a52839e1a6a2556a5868c63807cc4c57581e79033b4c994bd372bfd2
-
SHA512
09bea997e97dc8a46ded29d5f59a990b26aa8031b7dcf5248f68d7f1053cabc4cda4a5cadf78af8fa0d0f3645dc255ec4473f60e98426229d9f04edb05bed1fe
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-