General
-
Target
422b0bfffc2ba733e760906542d5d277.exe
-
Size
112KB
-
Sample
221022-j548ksbfh9
-
MD5
422b0bfffc2ba733e760906542d5d277
-
SHA1
7f6568cb6196ec417d365f4538ed9e37ed45e2c6
-
SHA256
64ccba7ac149fb3ebcecbd5ed999bce8cb84fa43f2491a5d735fc182af673ff3
-
SHA512
e1d7e0546ee316da989e7e9f3dd465b45dd4e591162b94190badb810ffee34aa1266d50cf590af5dd5010f2d4151c2a7e16bb6f39a37811932dddec16aab7eb4
-
SSDEEP
3072:KExRaQ6raoCoCyz6/mqv1JR+yBtGOeaeWgiIq:faO1tme++wi3
Behavioral task
behavioral1
Sample
422b0bfffc2ba733e760906542d5d277.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
422b0bfffc2ba733e760906542d5d277.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
azorult
http://cripslayerx.com/PL341/PL341/
Targets
-
-
Target
422b0bfffc2ba733e760906542d5d277.exe
-
Size
112KB
-
MD5
422b0bfffc2ba733e760906542d5d277
-
SHA1
7f6568cb6196ec417d365f4538ed9e37ed45e2c6
-
SHA256
64ccba7ac149fb3ebcecbd5ed999bce8cb84fa43f2491a5d735fc182af673ff3
-
SHA512
e1d7e0546ee316da989e7e9f3dd465b45dd4e591162b94190badb810ffee34aa1266d50cf590af5dd5010f2d4151c2a7e16bb6f39a37811932dddec16aab7eb4
-
SSDEEP
3072:KExRaQ6raoCoCyz6/mqv1JR+yBtGOeaeWgiIq:faO1tme++wi3
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-