General
-
Target
4da160dc1a5e5f2f2e0dee7ab9ccd3a522e34bbef2d602f35525b788f3afee2a.exe
-
Size
1.1MB
-
Sample
210903-wnggeaddb3
-
MD5
f3e6fa0e659557c6001a73217c98aa86
-
SHA1
199e41a1c37c789b0f93e0b0ac54a5797e170a74
-
SHA256
4da160dc1a5e5f2f2e0dee7ab9ccd3a522e34bbef2d602f35525b788f3afee2a
-
SHA512
e8283e511ac8756940bc47bbdf20c89f7d4149b065a38a414a24b71f24d97e98a82301b0a8c94b9977b2a4c6be954e28cfd3287bac331d5971901294ba1531d2
Static task
static1
Behavioral task
behavioral1
Sample
4da160dc1a5e5f2f2e0dee7ab9ccd3a522e34bbef2d602f35525b788f3afee2a.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
4da160dc1a5e5f2f2e0dee7ab9ccd3a522e34bbef2d602f35525b788f3afee2a.exe
Resource
win10-en
Malware Config
Extracted
oski
mazooyaar.ac.ug
Extracted
raccoon
43aae292cfe6f58a13bd7111bdd7d5ded5b23ec3
-
url4cnc
https://telete.in/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Targets
-
-
Target
4da160dc1a5e5f2f2e0dee7ab9ccd3a522e34bbef2d602f35525b788f3afee2a.exe
-
Size
1.1MB
-
MD5
f3e6fa0e659557c6001a73217c98aa86
-
SHA1
199e41a1c37c789b0f93e0b0ac54a5797e170a74
-
SHA256
4da160dc1a5e5f2f2e0dee7ab9ccd3a522e34bbef2d602f35525b788f3afee2a
-
SHA512
e8283e511ac8756940bc47bbdf20c89f7d4149b065a38a414a24b71f24d97e98a82301b0a8c94b9977b2a4c6be954e28cfd3287bac331d5971901294ba1531d2
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-