General
-
Target
63ad140fe517d76461dd8f735784438e63cfd501e54a13317721141527aa35e7.exe
-
Size
21KB
-
Sample
210427-6z9t4fdgdn
-
MD5
c925a87b460b410809510caa931dbbbd
-
SHA1
52195a254e4827ee6835b4c35f4c91411494c34f
-
SHA256
63ad140fe517d76461dd8f735784438e63cfd501e54a13317721141527aa35e7
-
SHA512
c06c848f2452a3e5cffb572f6e3ca95eb32cb76a3ca935c7d003c06a00e8decbebcb0b8e23949c16f50f8e1426c0f4764b1bf9d90b567f88a33dcb29a2b57f4c
Static task
static1
Behavioral task
behavioral1
Sample
63ad140fe517d76461dd8f735784438e63cfd501e54a13317721141527aa35e7.exe
Resource
win7v20210410
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Targets
-
-
Target
63ad140fe517d76461dd8f735784438e63cfd501e54a13317721141527aa35e7.exe
-
Size
21KB
-
MD5
c925a87b460b410809510caa931dbbbd
-
SHA1
52195a254e4827ee6835b4c35f4c91411494c34f
-
SHA256
63ad140fe517d76461dd8f735784438e63cfd501e54a13317721141527aa35e7
-
SHA512
c06c848f2452a3e5cffb572f6e3ca95eb32cb76a3ca935c7d003c06a00e8decbebcb0b8e23949c16f50f8e1426c0f4764b1bf9d90b567f88a33dcb29a2b57f4c
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-