General
-
Target
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe
-
Size
319KB
-
Sample
210613-c31s9se5lx
-
MD5
cf3e02420036747df018012ab33dec0a
-
SHA1
ce9db535821d7d43efeaf7e23df75977cb36d908
-
SHA256
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea
-
SHA512
a36c0ecc4184f0f815e55bfc3c67bd1a1b3cc6473e51e0e4af881278e05597273973aeeda5df0af502f5a502000cf858583bd694cfcbfee850df0b9c607e7fbd
Static task
static1
Behavioral task
behavioral1
Sample
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe
Resource
win7v20210410
Malware Config
Extracted
azorult
http://80.85.136.155/mia/index.php
Targets
-
-
Target
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea.exe
-
Size
319KB
-
MD5
cf3e02420036747df018012ab33dec0a
-
SHA1
ce9db535821d7d43efeaf7e23df75977cb36d908
-
SHA256
b85f098f87d269c3dddfb92af4f85492a0da382e0ef03c8b6a10a54ae45998ea
-
SHA512
a36c0ecc4184f0f815e55bfc3c67bd1a1b3cc6473e51e0e4af881278e05597273973aeeda5df0af502f5a502000cf858583bd694cfcbfee850df0b9c607e7fbd
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-