General
-
Target
Bitdefender.V10.f.r.Vista.keygen.zip
-
Size
4.4MB
-
Sample
210728-raqax3y1p6
-
MD5
38372c1f099a9191dc803d22b3b5c9e6
-
SHA1
25836ee64483bfe6273ca120a918d9d8b87aa9da
-
SHA256
26111363366c2407a77c92724b16a8b0403b0f4f0ce5a0fc6f2f318a08e64cda
-
SHA512
ab44e65b34105fe3e3052185f9a45bc4ea681caa8bca5edcd314a5860a4ab838073976290deb546cd35e8a88c8ca3145aa4f576e62b77fa0811380f2fd8ff3ff
Static task
static1
Behavioral task
behavioral1
Sample
Bitdefender.V10.f.r.Vista.keygen.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Bitdefender.V10.f.r.Vista.keygen.exe
Resource
win10v20210410
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Targets
-
-
Target
Bitdefender.V10.f.r.Vista.keygen.exe
-
Size
4.5MB
-
MD5
184443aa7af874f2863252aa00d4b2dd
-
SHA1
ecdbf97ba8e921cefc20a9c0033b0d99b658d183
-
SHA256
97fce777966677d4558fbc1106efbd017a4ecbee65c4c652478405a9e171346b
-
SHA512
6ebb27edf76dfb15726b712835158e16ed5dc064a29750766e15b12e37e18e1e8e7c23f5a3b428816c27fcbd67e611ed88cdbc1e54b2dd3fb82a16b34f915b33
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16
-
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M3
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-