Analysis

  • max time kernel
    33s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-07-2022 09:08

General

  • Target

    3bf071be282d16696584af13dc38e1c730f127f1b49504408676225d42874e1e.exe

  • Size

    572KB

  • MD5

    0aa7e834d1a5abf2333da9bb9add7905

  • SHA1

    bba965168af94f98fdb60ff6ab074fc1ea9c840b

  • SHA256

    3bf071be282d16696584af13dc38e1c730f127f1b49504408676225d42874e1e

  • SHA512

    19ea9a769e1c1dff122ba7f800bf7c0cd22cefe2de2027f31f3d775ee9143361064fd06272a55f2dd6241535f7ab6e2bdf33a21f906acdab41528c17b22f38bb

Malware Config

Extracted

Family

azorult

C2

http://evaroma.zone/panel1/gate.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bf071be282d16696584af13dc38e1c730f127f1b49504408676225d42874e1e.exe
    "C:\Users\Admin\AppData\Local\Temp\3bf071be282d16696584af13dc38e1c730f127f1b49504408676225d42874e1e.exe"
    1⤵
      PID:1364

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1364-54-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1364-56-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1364-55-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1364-57-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB