General
-
Target
ae1dbdbd44cf91d0dfd8218140d83169.exe
-
Size
157KB
-
Sample
210427-2gb4nk8y2a
-
MD5
ae1dbdbd44cf91d0dfd8218140d83169
-
SHA1
60b27c87bec5da203eeb5f412d933e1510cd1341
-
SHA256
89957f203fda93c39ff56e0f80b615df42bf4ed87fd0488c07581e4e3a14bb05
-
SHA512
8907fcbb4e1a43d23731a74792e341a43cd4085f5f95e50e2ec7fcc54fb2549e8dda2c67eda4c49200feb7ccf30b045dbb2d27c944ee3cfbbaa56a86e2d74b90
Static task
static1
Behavioral task
behavioral1
Sample
ae1dbdbd44cf91d0dfd8218140d83169.exe
Resource
win7v20210410
Malware Config
Extracted
azorult
http://lexusbiscuit.com/OiuBn/index.php
Targets
-
-
Target
ae1dbdbd44cf91d0dfd8218140d83169.exe
-
Size
157KB
-
MD5
ae1dbdbd44cf91d0dfd8218140d83169
-
SHA1
60b27c87bec5da203eeb5f412d933e1510cd1341
-
SHA256
89957f203fda93c39ff56e0f80b615df42bf4ed87fd0488c07581e4e3a14bb05
-
SHA512
8907fcbb4e1a43d23731a74792e341a43cd4085f5f95e50e2ec7fcc54fb2549e8dda2c67eda4c49200feb7ccf30b045dbb2d27c944ee3cfbbaa56a86e2d74b90
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-