Analysis

  • max time kernel
    150s
  • max time network
    23s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    05-10-2021 00:10

General

  • Target

    735d4133a6cafafb214a0a9e566b04a0b5c06a28ad2887c9856230c938b65f86.exe

  • Size

    112KB

  • MD5

    b8375b25960a45d8f241f8f9cca25596

  • SHA1

    9056e7f4d0b3f6b4f4ca9dbaa654d27a8b443fd4

  • SHA256

    735d4133a6cafafb214a0a9e566b04a0b5c06a28ad2887c9856230c938b65f86

  • SHA512

    945eb4ba012a5cec515050bbd1c43929310b57e5e23015ebbf6a2ed4a7fdd61a7b1f0ebff4826c9bd306b922d6b289e5d01b4a2ebacd0827fbb69eb1232f6e48

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • suricata: ET MALWARE AZORult Variant.4 Checkin M2

    suricata: ET MALWARE AZORult Variant.4 Checkin M2

Processes

  • C:\Users\Admin\AppData\Local\Temp\735d4133a6cafafb214a0a9e566b04a0b5c06a28ad2887c9856230c938b65f86.exe
    "C:\Users\Admin\AppData\Local\Temp\735d4133a6cafafb214a0a9e566b04a0b5c06a28ad2887c9856230c938b65f86.exe"
    1⤵
      PID:1544

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1544-54-0x00000000751D1000-0x00000000751D3000-memory.dmp
      Filesize

      8KB