Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
30-04-2021 09:03
Static task
static1
Behavioral task
behavioral1
Sample
RFQ 11054.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ 11054.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
RFQ 11054.exe
-
Size
922KB
-
MD5
927af771cdf72afe226edace22bf6c04
-
SHA1
34420017b8a8d5c3ed6f039c11a756c193765de7
-
SHA256
a6203ca5a80eb73bf0f245a482f68ce1ed689d9d57bfd943b3a82cdbc686391a
-
SHA512
1a9ff3d13c653f79f188820d409a1d219f1573e77d68ecc1755105f107ea10135b796b98b0a68e2e39e4dc01b0b758a80108fbd9ead1daa4a95d19a00c450784
Score
10/10
Malware Config
Extracted
Family
azorult
C2
http://13.233.97.208/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ 11054.exedescription pid process target process PID 3904 set thread context of 64 3904 RFQ 11054.exe RFQ 11054.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
RFQ 11054.exedescription pid process target process PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe PID 3904 wrote to memory of 64 3904 RFQ 11054.exe RFQ 11054.exe