General
-
Target
Company Profile.exe
-
Size
1.4MB
-
Sample
230321-lvgqmshf28
-
MD5
e95513699fc482656195fbde55356a3e
-
SHA1
0fe81c9795cf8f69900282d0f221d7bdcc6c7dc0
-
SHA256
da4639c1d3d19efcbf6518e934d560a94e10cfee4f2d87d2d3bab033258f9de2
-
SHA512
be1918721fe9c55c3d021a541c125e5732f63e6668df0551c9472523ee4ddc6c70b34d588511e84bca75715645b8c143dbe394901f22f1c3f8715e3a3f3aae17
-
SSDEEP
6144:e71cs+BmGGNzFb8JVQzB6fx2CxwXL/O8VNkNXfY1MTrFWLrUxoooooooooooG6d3:eRcczFbUVQzUYO8VNkV5TrFed
Static task
static1
Behavioral task
behavioral1
Sample
Company Profile.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Company Profile.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
azorult
http://193.42.33.252/index.php
Targets
-
-
Target
Company Profile.exe
-
Size
1.4MB
-
MD5
e95513699fc482656195fbde55356a3e
-
SHA1
0fe81c9795cf8f69900282d0f221d7bdcc6c7dc0
-
SHA256
da4639c1d3d19efcbf6518e934d560a94e10cfee4f2d87d2d3bab033258f9de2
-
SHA512
be1918721fe9c55c3d021a541c125e5732f63e6668df0551c9472523ee4ddc6c70b34d588511e84bca75715645b8c143dbe394901f22f1c3f8715e3a3f3aae17
-
SSDEEP
6144:e71cs+BmGGNzFb8JVQzB6fx2CxwXL/O8VNkNXfY1MTrFWLrUxoooooooooooG6d3:eRcczFbUVQzUYO8VNkV5TrFed
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-