Analysis

  • max time kernel
    119s
  • max time network
    133s
  • submitted
    01-01-1970 00:00

General

  • Target

    e60f5cf1e6d747b279f97b990ee3c3c14ccb35572bb8f748bf0b1ca575e6dddc.exe

  • Size

    218KB

  • MD5

    e38e18c6b8fc1f9abd0ed7ce9aa45fda

  • SHA1

    29094871bace66663a0d00a2c37c3c4180c30fa8

  • SHA256

    e60f5cf1e6d747b279f97b990ee3c3c14ccb35572bb8f748bf0b1ca575e6dddc

  • SHA512

    2acf5ec8e7b6d492de0664885c23f5947ecea4773cbfebf3df72c0a37779208915972692c301a6ecc6eff84cc413ead214b63726737fcc26e2de7374c3515003

Malware Config

Extracted

Family

azorult

C2

http://45.133.1.13/xsaz/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M18

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M18

Processes

  • C:\Users\Admin\AppData\Local\Temp\e60f5cf1e6d747b279f97b990ee3c3c14ccb35572bb8f748bf0b1ca575e6dddc.exe
    "C:\Users\Admin\AppData\Local\Temp\e60f5cf1e6d747b279f97b990ee3c3c14ccb35572bb8f748bf0b1ca575e6dddc.exe"
    1⤵
      PID:784

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/784-115-0x0000000004AE0000-0x0000000004AF1000-memory.dmp
      Filesize

      68KB

    • memory/784-117-0x0000000000400000-0x0000000002EFC000-memory.dmp
      Filesize

      43.0MB

    • memory/784-116-0x0000000004B00000-0x0000000004B1D000-memory.dmp
      Filesize

      116KB