Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    12-05-2021 04:31

General

  • Target

    859E7F8C7BB3D2BAF6F91854CCA67F93352CD81649279.exe

  • Size

    117KB

  • MD5

    e360e1f99ea6a21298895090c74056f4

  • SHA1

    54230b71268aa64f1fe1a71762e8c8ed36e1fc15

  • SHA256

    859e7f8c7bb3d2baf6f91854cca67f93352cd816492794128ccb119b0e345c45

  • SHA512

    ae4007a1b79aa21f6e29765c7f91b8d81afa818f18e61ef6b8761b304cdc5791b3c2f1fdc118755385a6ee882af784fca8375d16520487d7b08e54ad8bb7adc0

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\859E7F8C7BB3D2BAF6F91854CCA67F93352CD81649279.exe
    "C:\Users\Admin\AppData\Local\Temp\859E7F8C7BB3D2BAF6F91854CCA67F93352CD81649279.exe"
    1⤵
      PID:4016

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4016-114-0x0000000000400000-0x000000000043B000-memory.dmp

      Filesize

      236KB