Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
21-10-2021 15:58
Static task
static1
Behavioral task
behavioral1
Sample
azorult_cpp.bin.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
azorult_cpp.bin.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
azorult_cpp.bin.exe
-
Size
79KB
-
MD5
5b26880f80a00397bc379caf5cadc564
-
SHA1
2de82ffa5833efbeb1c625f7be06a65c9814626d
-
SHA256
9d6611c2779316f1ef4b4a6edcfdfb5e770fe32b31ec2200df268c3bd236ed75
-
SHA512
ccb0e6e4a78277a620d91cfde608e48a91ca1eaf945071f5e1c8561a31abb7b85f2cc0acd4dee2002c21e173d25a2d4f4b47c25361c58adea06312bcf9132337
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1680-55-0x00000000754F1000-0x00000000754F3000-memory.dmpFilesize
8KB