General
-
Target
0x00150000000054ab-55.dat
-
Size
112KB
-
Sample
220922-swljjsfegq
-
MD5
7bf94fa78271a52280b47987eb83e0b1
-
SHA1
f76b9eac5f764c060e670232082561457b345834
-
SHA256
d3da7acff4b029790c9645e592c63db3c5e9e4a0adc76c135810abeef17c77a9
-
SHA512
d027679765d3c780403b5cfa7a691546825268940320e37a57277f9db789f7f350a367271f6a81e75eb705026edd051734d144799fcd830ab4daa704ea378bfd
-
SSDEEP
3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeaeWgiYq:faZ1tme++win
Behavioral task
behavioral1
Sample
0x00150000000054ab-55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0x00150000000054ab-55.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
azorult
http://ichgh.com/mk/index.php
Targets
-
-
Target
0x00150000000054ab-55.dat
-
Size
112KB
-
MD5
7bf94fa78271a52280b47987eb83e0b1
-
SHA1
f76b9eac5f764c060e670232082561457b345834
-
SHA256
d3da7acff4b029790c9645e592c63db3c5e9e4a0adc76c135810abeef17c77a9
-
SHA512
d027679765d3c780403b5cfa7a691546825268940320e37a57277f9db789f7f350a367271f6a81e75eb705026edd051734d144799fcd830ab4daa704ea378bfd
-
SSDEEP
3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeaeWgiYq:faZ1tme++win
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-