General
-
Target
d40e6b3f445ecc817cb70bf8778f4997b9dafd604b962206a49b33a8db157255.exe
-
Size
1.1MB
-
Sample
211103-aczmyscgh3
-
MD5
2df827a178fcfa149a64046339868665
-
SHA1
13a09e2dcd38a2466428692b884cd0873f3563f1
-
SHA256
d40e6b3f445ecc817cb70bf8778f4997b9dafd604b962206a49b33a8db157255
-
SHA512
9c38bd4a5a7aaf989b2e7278eed90040a26ca5bcda6404727a906b723a0847c96286472035e80a6f8c58a2eaa64f80810fb9fd2f704ea1cfc21ad41f24457c9b
Static task
static1
Behavioral task
behavioral1
Sample
d40e6b3f445ecc817cb70bf8778f4997b9dafd604b962206a49b33a8db157255.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
d40e6b3f445ecc817cb70bf8778f4997b9dafd604b962206a49b33a8db157255.exe
Resource
win10-en-20211014
Malware Config
Extracted
raccoon
32365171a31c4583d6e3b7aad1690e41cefc38eb
-
url4cnc
http://telegalive.top/brikitiki
http://toptelete.top/brikitiki
http://telegraf.top/brikitiki
https://t.me/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
colonna.ac.ug
Targets
-
-
Target
d40e6b3f445ecc817cb70bf8778f4997b9dafd604b962206a49b33a8db157255.exe
-
Size
1.1MB
-
MD5
2df827a178fcfa149a64046339868665
-
SHA1
13a09e2dcd38a2466428692b884cd0873f3563f1
-
SHA256
d40e6b3f445ecc817cb70bf8778f4997b9dafd604b962206a49b33a8db157255
-
SHA512
9c38bd4a5a7aaf989b2e7278eed90040a26ca5bcda6404727a906b723a0847c96286472035e80a6f8c58a2eaa64f80810fb9fd2f704ea1cfc21ad41f24457c9b
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-