General
-
Target
Ziraat Bankasi Swift Mesaji.xls
-
Size
181KB
-
Sample
210511-g8ye4n9dpn
-
MD5
3b0c07c41b797f2b0ffcae966cc9a82d
-
SHA1
b672f397332baea3f71459132820c2d95af8d2b4
-
SHA256
8ef2d30adee7c780cf545fa682c0b3d5fe6888b98aa44a672a6aee0ba177f550
-
SHA512
f167070df4873bc3d090c11d9a7c3e392a3f2b10d7362496ec9104888f57662a5da7a8c7fdbf2e7f58aa344c46a2ab0c7dc1c3d919942c3c4b696af8cfd5d98b
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift Mesaji.xls
Resource
win10v20210408
Malware Config
Extracted
azorult
http://ahsanulalam.buet.ac.bd/bvyukiu/index.php
Targets
-
-
Target
Ziraat Bankasi Swift Mesaji.xls
-
Size
181KB
-
MD5
3b0c07c41b797f2b0ffcae966cc9a82d
-
SHA1
b672f397332baea3f71459132820c2d95af8d2b4
-
SHA256
8ef2d30adee7c780cf545fa682c0b3d5fe6888b98aa44a672a6aee0ba177f550
-
SHA512
f167070df4873bc3d090c11d9a7c3e392a3f2b10d7362496ec9104888f57662a5da7a8c7fdbf2e7f58aa344c46a2ab0c7dc1c3d919942c3c4b696af8cfd5d98b
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-