General
-
Target
3d2a782f7392be8b7941287ddd8641c9d4da84ea5c3e43b9964bb4b6ef904a5c
-
Size
10.5MB
-
Sample
220703-eljejseebk
-
MD5
ad490fe7059e40a7f44b27816dddc566
-
SHA1
91c73a1800787374c0ee2420dd8c9fc096f26f1f
-
SHA256
3d2a782f7392be8b7941287ddd8641c9d4da84ea5c3e43b9964bb4b6ef904a5c
-
SHA512
e04d1dca51032bacfc7deb7b02723d8b3cb0ad1b9cbcf49c51dc97299f96751d4998c82269ffe2e6ff0e5bf8a0b36cd477da1116274a99ef562e91022411df05
Static task
static1
Behavioral task
behavioral1
Sample
3d2a782f7392be8b7941287ddd8641c9d4da84ea5c3e43b9964bb4b6ef904a5c.exe
Resource
win7-20220414-en
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Targets
-
-
Target
3d2a782f7392be8b7941287ddd8641c9d4da84ea5c3e43b9964bb4b6ef904a5c
-
Size
10.5MB
-
MD5
ad490fe7059e40a7f44b27816dddc566
-
SHA1
91c73a1800787374c0ee2420dd8c9fc096f26f1f
-
SHA256
3d2a782f7392be8b7941287ddd8641c9d4da84ea5c3e43b9964bb4b6ef904a5c
-
SHA512
e04d1dca51032bacfc7deb7b02723d8b3cb0ad1b9cbcf49c51dc97299f96751d4998c82269ffe2e6ff0e5bf8a0b36cd477da1116274a99ef562e91022411df05
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Modifies visiblity of hidden/system files in Explorer
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
XMRig Miner Payload
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Account Manipulation
1Hidden Files and Directories
3Modify Existing Service
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1