Analysis

  • max time kernel
    78s
  • max time network
    79s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23/05/2022, 01:49

General

  • Target

    f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe

  • Size

    300KB

  • MD5

    6bf580ccfa8cdef620ba37082e5f7d66

  • SHA1

    d0e590d8615e640cc563a5d6294df8278ae3f2e5

  • SHA256

    f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8

  • SHA512

    f6023345ca884ae4200748a17dc6f45e9001a2de5e09c278298968fd091c91f27c1ee6cfcc11b3934ed02b430a5e34d921aa4ff171db2e86656f0a0a2b49ca5e

Malware Config

Extracted

Family

azorult

C2

http://2.56.59.31/purelogs/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe"
    1⤵
      PID:916

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/916-54-0x0000000075C71000-0x0000000075C73000-memory.dmp

            Filesize

            8KB

          • memory/916-55-0x000000000065D000-0x000000000066F000-memory.dmp

            Filesize

            72KB

          • memory/916-56-0x0000000000220000-0x000000000023D000-memory.dmp

            Filesize

            116KB

          • memory/916-57-0x0000000000400000-0x0000000000476000-memory.dmp

            Filesize

            472KB