General
-
Target
P20200107.DOC
-
Size
147KB
-
Sample
210428-ef9dg42m2e
-
MD5
cce9b14129aee66a8441a51e0b867f77
-
SHA1
6e67f5a70dba1c0209a5a5d453e5b78a23e1afbc
-
SHA256
bc189bf0c472233f27e489678f02d6d9c67c1a91de7b8b4402efe0669f2c1d80
-
SHA512
5e9540eed934052d4ceebbbef616e651d788fbfb27ab216ef1524acc53f03148d17b11b7d531801f045ed8f9b9f8f4aca34aa816076c482b16ec21acade210f9
Static task
static1
Behavioral task
behavioral1
Sample
P20200107.DOC
Resource
win7v20210410
Behavioral task
behavioral2
Sample
P20200107.DOC
Resource
win10v20210408
Malware Config
Extracted
oski
5llion.com
Extracted
azorult
http://bengalcement.com.bd/AxPu/index.php
Targets
-
-
Target
P20200107.DOC
-
Size
147KB
-
MD5
cce9b14129aee66a8441a51e0b867f77
-
SHA1
6e67f5a70dba1c0209a5a5d453e5b78a23e1afbc
-
SHA256
bc189bf0c472233f27e489678f02d6d9c67c1a91de7b8b4402efe0669f2c1d80
-
SHA512
5e9540eed934052d4ceebbbef616e651d788fbfb27ab216ef1524acc53f03148d17b11b7d531801f045ed8f9b9f8f4aca34aa816076c482b16ec21acade210f9
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-