General
-
Target
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
-
Size
2MB
-
Sample
230713-hllfpaff52
-
MD5
f604fbc90d64dc2c624b22d1523b7737
-
SHA1
858069c94d343e098a527e91dfb3d125dbe83d1c
-
SHA256
c1033eb7b033b3ab0045c19f173b0b50fc8a7ba215f5366b1474c0606b69223d
-
SHA512
d44e0d516348d481cc766ca986ff1f777856e1f22ebafb596f06554f8b0265e37dec452636d0174802eab4c357f21ff1f84b766e6526d82977c43f30efbcbaa6
-
SSDEEP
49152:IBJL+nDPsLoH6+idxTvEXBTfelS5ZiQZLlxdvfjHgrhKksGBIQ/:ykTp5lRTGlSfiQZLRvfLkZBIW
Static task
static1
Behavioral task
behavioral1
Sample
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
https://www.connectingkeralam.com/wp-content/uploads/debug2.ps1
Extracted
azorult
http://domcomp.info/1210776429.php
Extracted
pony
http://top.thisispw.com/keys7369921/gate.php
Targets
-
-
Target
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
-
Size
2MB
-
MD5
f604fbc90d64dc2c624b22d1523b7737
-
SHA1
858069c94d343e098a527e91dfb3d125dbe83d1c
-
SHA256
c1033eb7b033b3ab0045c19f173b0b50fc8a7ba215f5366b1474c0606b69223d
-
SHA512
d44e0d516348d481cc766ca986ff1f777856e1f22ebafb596f06554f8b0265e37dec452636d0174802eab4c357f21ff1f84b766e6526d82977c43f30efbcbaa6
-
SSDEEP
49152:IBJL+nDPsLoH6+idxTvEXBTfelS5ZiQZLlxdvfjHgrhKksGBIQ/:ykTp5lRTGlSfiQZLRvfLkZBIW
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-