General
-
Target
DHL varış Bildirimi _251407467, pdf.img
-
Size
1.2MB
-
Sample
220922-hlq16seagn
-
MD5
6cc9902bae0713fdf1949c9f756d6dac
-
SHA1
b3c2e7dcdd8615d62fd011f5883b3563ac6ab5b6
-
SHA256
42bc8cc02b30ec62fb1b8bd59a0564ab8dc45c8d81d1b14184bb77f1291057c6
-
SHA512
1abbaa935a91f0ad09acc804f3709c9c086bd19b76f90915f9bb72ca77372fe65e8aa6727ae51f68338cd6bd524a8c36376df78e151cd47ddcf2a4e71e5af378
-
SSDEEP
3072:QH82ZI4qxMBNTfPYBZdpFyHhfYNDew2Lj1DzOH:+8YqWBJHYBvOHeN2L5W
Static task
static1
Behavioral task
behavioral1
Sample
DHL_VARI.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DHL_VARI.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
azorult
http://huizechina.co/PL341/index.php
Targets
-
-
Target
DHL_VARI.EXE
-
Size
155KB
-
MD5
177fa2fcb4db306c95cb0a7bc05aa6d6
-
SHA1
f5d409c93b800a6d3367817285f6e78229c174ba
-
SHA256
5173308acdc7cfbb18621685a0a5a6db64ad1c95aadbe4cceca348f071239245
-
SHA512
cdf5b6e0b9fd3e198177e4d7e0759ecbfd00d29cc57d4114d6c8ff4469089e48df07c5f659ccd9d34eac792a7482727a31243b8cab50c53058d32fa2792ab86a
-
SSDEEP
3072:u82ZI4qxMBNTfPYBZdpFyHhfYNDew2Lj1DzOHm:u8YqWBJHYBvOHeN2L5WG
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-