Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    13-05-2021 13:55

General

  • Target

    b2a5a7ec07d3c5aaae402b5e0461cb2de97439b383bb7ceb0a37fcc9073fc80c.exe

  • Size

    112KB

  • MD5

    60aae82332ee7f53c27a14a074e72bbb

  • SHA1

    fef9b4c566c4995c058d563e54475c269ed964a5

  • SHA256

    b2a5a7ec07d3c5aaae402b5e0461cb2de97439b383bb7ceb0a37fcc9073fc80c

  • SHA512

    288a719cf9e6f2d22992fa38084ddb7a1ee7446c14dcd05c48f5a30212f29fd3d6ab6afddbf6da0f015925eaf4a932d4e032565c583019e3f9c056f771f07576

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2a5a7ec07d3c5aaae402b5e0461cb2de97439b383bb7ceb0a37fcc9073fc80c.exe
    "C:\Users\Admin\AppData\Local\Temp\b2a5a7ec07d3c5aaae402b5e0461cb2de97439b383bb7ceb0a37fcc9073fc80c.exe"
    1⤵
      PID:4008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads