Behavioral task
behavioral1
Sample
3344-134-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3344-134-0x0000000000400000-0x0000000000420000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
3344-134-0x0000000000400000-0x0000000000420000-memory.dmp
-
Size
128KB
-
MD5
a79db0ceacd94cc3d93d2f482a03e087
-
SHA1
7720be4a00b4e2670189eec7d5a0f2e5476eeef3
-
SHA256
61d6f3a63e8c89e22b8dd752d27c19a08ec6e7160b57d7d19574210bd01e737a
-
SHA512
85f3e01882ca08bc8ba1558bac18342b80100b42239a138a2bab2b4f49b5c2a87c5cbfa845b9fa16ed64f4c8dd105468e58213533538b4f9cf764e4c69c66e61
-
SSDEEP
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/zxg/:Zzx7ZApszolIo7lf/ipT/z
Malware Config
Extracted
azorult
http://141.98.6.75/dike/index.php
Signatures
-
Azorult family
Files
-
3344-134-0x0000000000400000-0x0000000000420000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ