Behavioral task
behavioral1
Sample
540-71-0x0000000000400000-0x0000000000423000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
540-71-0x0000000000400000-0x0000000000423000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
540-71-0x0000000000400000-0x0000000000423000-memory.dmp
-
Size
140KB
-
MD5
861200806aabbe81e15c5642d66e5f19
-
SHA1
f9246cbd4ccb7c107642d9a4afd48b0dedfeb3a2
-
SHA256
bad0b72ae79d2072e06cf8ed02194b43abb6272ace567da854d74abcdf5dd08c
-
SHA512
93b9e1698c904934180b885562804bceb20bb3d1bb1ada9c9ab493fa07efc874e616faed22610979958160fac5a75d88943382b624280f955ff85232c9cf73d2
-
SSDEEP
3072:dxRaQ6raoCoCyz6/mqv1JR+yBtGOeaeWgif:VaO1tme++wi
Malware Config
Extracted
azorult
http://azla3e.shop/dbkl/index.php
Signatures
Files
-
540-71-0x0000000000400000-0x0000000000423000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 41KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE