General
-
Target
5767e893c6d589185a910b5e1319a19dbb4ca699e59fb6856c53cbedb8605fe6.exe
-
Size
1.7MB
-
Sample
210516-cgg8p9yje2
-
MD5
bb04adbaf1981c4c30fd20a66ca6c8ab
-
SHA1
78bf450416388c92195d3291bb256011e4617e5c
-
SHA256
5767e893c6d589185a910b5e1319a19dbb4ca699e59fb6856c53cbedb8605fe6
-
SHA512
d3ac9ed6ee111930abbde7697ee5c3b02a50266ce9c8977de78504b34995b0f8d2fdd90679fc4e3a86a8b14c26d7d1ec3da6720973b9a263be937e9052272f72
Static task
static1
Behavioral task
behavioral1
Sample
5767e893c6d589185a910b5e1319a19dbb4ca699e59fb6856c53cbedb8605fe6.exe
Resource
win7v20210410
Malware Config
Extracted
azorult
http://ngoagency.org/wp-content/temp/se/index.php
Targets
-
-
Target
5767e893c6d589185a910b5e1319a19dbb4ca699e59fb6856c53cbedb8605fe6.exe
-
Size
1.7MB
-
MD5
bb04adbaf1981c4c30fd20a66ca6c8ab
-
SHA1
78bf450416388c92195d3291bb256011e4617e5c
-
SHA256
5767e893c6d589185a910b5e1319a19dbb4ca699e59fb6856c53cbedb8605fe6
-
SHA512
d3ac9ed6ee111930abbde7697ee5c3b02a50266ce9c8977de78504b34995b0f8d2fdd90679fc4e3a86a8b14c26d7d1ec3da6720973b9a263be937e9052272f72
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-