General
-
Target
Ziraat Bankasi Swift Mesaji.exe
-
Size
236KB
-
Sample
210506-l3x1k989hs
-
MD5
41a8eefc3266fe55a90e522a016f54d4
-
SHA1
a3a931064476409dd4114cf01668860ad5dab37c
-
SHA256
624e5509cedfb8121623c45d583c18e8fc351bf881aafb5c2de521fccba60240
-
SHA512
bb4085fc421c007d0612a795285cdd00a3615ec51055648520dd23f95a2f1f7e643ca106b3ea5863b569048b3aba2bae30c021e9237294596d98ed42d8bba85e
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift Mesaji.exe
Resource
win10v20210408
Malware Config
Extracted
azorult
http://bengalcement.com.bd/AxPu/index.php
Targets
-
-
Target
Ziraat Bankasi Swift Mesaji.exe
-
Size
236KB
-
MD5
41a8eefc3266fe55a90e522a016f54d4
-
SHA1
a3a931064476409dd4114cf01668860ad5dab37c
-
SHA256
624e5509cedfb8121623c45d583c18e8fc351bf881aafb5c2de521fccba60240
-
SHA512
bb4085fc421c007d0612a795285cdd00a3615ec51055648520dd23f95a2f1f7e643ca106b3ea5863b569048b3aba2bae30c021e9237294596d98ed42d8bba85e
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-