Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-06-2022 21:33

General

  • Target

    1744879954a7c0f6d7a7a9f82834564870865ad28e3ca25116a7c55de163a01f.exe

  • Size

    554KB

  • MD5

    718eaab61745c36bbb46a4912d17bfd7

  • SHA1

    b259e3a6a91be02a07e4abf9b5ab37f05ac10ea9

  • SHA256

    1744879954a7c0f6d7a7a9f82834564870865ad28e3ca25116a7c55de163a01f

  • SHA512

    d9fbda0d07a4a3448fca5fb11a28c1580c6435f82eaf529e30127bd9cc6fba10827baab8c78dd113d0996a3550ca07803267a4e1f92e50d696a1af9f37f8d9a9

Malware Config

Extracted

Family

azorult

C2

http://185.92.74.85/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1744879954a7c0f6d7a7a9f82834564870865ad28e3ca25116a7c55de163a01f.exe
    "C:\Users\Admin\AppData\Local\Temp\1744879954a7c0f6d7a7a9f82834564870865ad28e3ca25116a7c55de163a01f.exe"
    1⤵
      PID:2804

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2804-130-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB

    • memory/2804-131-0x0000000000400000-0x0000000000420000-memory.dmp

      Filesize

      128KB

    • memory/2804-132-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB

    • memory/2804-133-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB

    • memory/2804-134-0x0000000000400000-0x0000000000499000-memory.dmp

      Filesize

      612KB