General
-
Target
F0D14517FDC249BDD8F3BD53F8D9C341.exe
-
Size
4.1MB
-
Sample
210903-d23bxscaa5
-
MD5
f0d14517fdc249bdd8f3bd53f8d9c341
-
SHA1
b64c49054f5c98211c6c44f48acc33f14eeb9838
-
SHA256
ccd5ab291113bf69fcbccee8ab889c9cf5a0d0240feed43b73785497ace3c467
-
SHA512
8f7f6114523426fb3c1040ccc2e56b38ffd1341c5e1356e6f44eda9afbf877c76946dffc46a4a8fac71eb02ba67a6212f07627903b810858c6a95ed94e0f4f96
Static task
static1
Behavioral task
behavioral1
Sample
F0D14517FDC249BDD8F3BD53F8D9C341.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
F0D14517FDC249BDD8F3BD53F8D9C341.exe
Resource
win10v20210408
Malware Config
Extracted
oski
mazooyaar.ac.ug
Extracted
azorult
http://195.245.112.115/index.php
Extracted
raccoon
43aae292cfe6f58a13bd7111bdd7d5ded5b23ec3
-
url4cnc
https://telete.in/brikitiki
Targets
-
-
Target
F0D14517FDC249BDD8F3BD53F8D9C341.exe
-
Size
4.1MB
-
MD5
f0d14517fdc249bdd8f3bd53f8d9c341
-
SHA1
b64c49054f5c98211c6c44f48acc33f14eeb9838
-
SHA256
ccd5ab291113bf69fcbccee8ab889c9cf5a0d0240feed43b73785497ace3c467
-
SHA512
8f7f6114523426fb3c1040ccc2e56b38ffd1341c5e1356e6f44eda9afbf877c76946dffc46a4a8fac71eb02ba67a6212f07627903b810858c6a95ed94e0f4f96
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-