Malware Analysis Report

2025-08-05 14:30

Sample ID 220523-b8qwcsbdh4
Target 02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe
SHA256 02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9
Tags
upx azorult infostealer suricata trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9

Threat Level: Known bad

The file 02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe was found to be: Known bad.

Malicious Activity Summary

upx azorult infostealer suricata trojan

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

Azorult

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M4

UPX packed file

Program crash

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-05-23 01:49

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-05-23 01:49

Reported

2022-05-23 01:59

Platform

win7-20220414-en

Max time kernel

43s

Max time network

46s

Command Line

"C:\Users\Admin\AppData\Local\Temp\02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe"

Signatures

Azorult

trojan infostealer azorult

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M4

suricata

Processes

C:\Users\Admin\AppData\Local\Temp\02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe

"C:\Users\Admin\AppData\Local\Temp\02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe"

Network

Country Destination Domain Proto
NL 51.15.62.59:80 51.15.62.59 tcp

Files

memory/1928-54-0x0000000076011000-0x0000000076013000-memory.dmp

memory/1928-55-0x0000000000390000-0x00000000003A6000-memory.dmp

memory/1928-56-0x0000000000400000-0x0000000000457000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-05-23 01:49

Reported

2022-05-23 01:59

Platform

win10v2004-20220414-en

Max time kernel

90s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe"

Signatures

Azorult

trojan infostealer azorult

suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

suricata

Processes

C:\Users\Admin\AppData\Local\Temp\02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe

"C:\Users\Admin\AppData\Local\Temp\02004bb456c1fccd80b6b560f2feda55cfafddf9a2dad0f382ff65040c8306b9.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2348 -ip 2348

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 1428

Network

Country Destination Domain Proto
NL 51.15.62.59:80 tcp
NL 51.15.62.59:80 51.15.62.59 tcp
NL 104.110.191.140:80 tcp
NL 104.110.191.140:80 tcp
US 13.89.178.26:443 tcp
NL 104.110.191.140:80 tcp
NL 104.110.191.140:80 tcp
GB 92.123.140.25:80 tcp

Files

memory/2348-130-0x00000000021D0000-0x00000000021E6000-memory.dmp

memory/2348-131-0x0000000000400000-0x0000000000457000-memory.dmp