General
-
Target
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
-
Size
2MB
-
Sample
230714-kang1sdf5z
-
MD5
bcecd4ea27d94a628fa068badc12f047
-
SHA1
f0fd7428d3008ec1e30a5a0bc72cd24eb62911ff
-
SHA256
20a5c992037407d1970af6568a0db0e3bca475cc71340ec024709ab9d127a219
-
SHA512
c00cf722e44805d5b7b162f48f10f6f49dfd5376f1880f625c0398c50456b9151f68f3fa17b1b3d3042eaaaf95f5bb9f86cb4b99ea6d1473192ee0889b8ea286
-
SSDEEP
24576:2TbBv5rUyXVd0j5J6FXUqJOvQtgOz3CXLoTTuoZlJ/i0C8PyrAL+hzv2m6SvHwre:IBJOBSkbODC7roZlH7Kr5zh6YPunj8H7
Static task
static1
Behavioral task
behavioral1
Sample
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
https://www.connectingkeralam.com/wp-content/uploads/debug2.ps1
Extracted
azorult
http://domcomp.info/1210776429.php
Extracted
pony
http://top.thisispw.com/keys7369921/gate.php
Targets
-
-
Target
Bandicut_3_5_0_keygen_by_KeyGenAI.exe
-
Size
2MB
-
MD5
bcecd4ea27d94a628fa068badc12f047
-
SHA1
f0fd7428d3008ec1e30a5a0bc72cd24eb62911ff
-
SHA256
20a5c992037407d1970af6568a0db0e3bca475cc71340ec024709ab9d127a219
-
SHA512
c00cf722e44805d5b7b162f48f10f6f49dfd5376f1880f625c0398c50456b9151f68f3fa17b1b3d3042eaaaf95f5bb9f86cb4b99ea6d1473192ee0889b8ea286
-
SSDEEP
24576:2TbBv5rUyXVd0j5J6FXUqJOvQtgOz3CXLoTTuoZlJ/i0C8PyrAL+hzv2m6SvHwre:IBJOBSkbODC7roZlH7Kr5zh6YPunj8H7
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-