General

  • Target

    540-71-0x0000000000400000-0x0000000000423000-memory.dmp

  • Size

    140KB

  • MD5

    861200806aabbe81e15c5642d66e5f19

  • SHA1

    f9246cbd4ccb7c107642d9a4afd48b0dedfeb3a2

  • SHA256

    bad0b72ae79d2072e06cf8ed02194b43abb6272ace567da854d74abcdf5dd08c

  • SHA512

    93b9e1698c904934180b885562804bceb20bb3d1bb1ada9c9ab493fa07efc874e616faed22610979958160fac5a75d88943382b624280f955ff85232c9cf73d2

  • SSDEEP

    3072:dxRaQ6raoCoCyz6/mqv1JR+yBtGOeaeWgif:VaO1tme++wi

Score
10/10

Malware Config

Extracted

Family

azorult

C2

http://azla3e.shop/dbkl/index.php

Signatures

  • Azorult family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • 540-71-0x0000000000400000-0x0000000000423000-memory.dmp
    .exe windows x86


    Headers

    Sections