Analysis

  • max time kernel
    60s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-04-2021 08:40

General

  • Target

    RFQ 11054.exe

  • Size

    922KB

  • MD5

    927af771cdf72afe226edace22bf6c04

  • SHA1

    34420017b8a8d5c3ed6f039c11a756c193765de7

  • SHA256

    a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a

  • SHA512

    1a9ff3d13c653f79f188820d409a1d219f1573e77d68ecc1755105f107ea10135b796b98b0a68e2e39e4dc01b0b758a80108fbd9ead1daa4a95d19a00c450784

Malware Config

Extracted

Family

azorult

C2

http://13.233.97.208/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RFQ 11054.exe
    "C:\Users\Admin\AppData\Local\Temp\RFQ 11054.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\RFQ 11054.exe
      "{path}"
      2⤵
        PID:3832

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3832-116-0x000000000041A1F8-mapping.dmp
    • memory/3832-115-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/3832-117-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/4668-114-0x0000000003140000-0x0000000003141000-memory.dmp
      Filesize

      4KB