General
-
Target
Dekont#17.07.2023.exe
-
Size
154KB
-
Sample
230717-gvwgksae42
-
MD5
571ee58005b14af0965178929079625b
-
SHA1
c8df9921cfa7fde32269c058f1361c4f5f117935
-
SHA256
7501179eedf19e9b094ed763b880f4673998ecef6d8b4732985d04ee0ef1ea1e
-
SHA512
3f884a0d24e505fddd38d78363aff5f30ced6a29265a1e8342a301a3a56a7f7bf5646e2304212f5c9a9e6e3cf44df82314d1a4ac9d3b72a8782b23c62364d279
-
SSDEEP
3072:+NzPHk9MpcQbhvCa7XgwLrn0f3Inmq0vd8LI2eTTn99Gddwkqu8DfHrCj:+hRFhvt7XvLrna3Movd6eTCDzqRvrCj
Static task
static1
Behavioral task
behavioral1
Sample
Dekont#17.07.2023.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Dekont#17.07.2023.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
azorult
http://mcoaz.shop/DXO341/index.php
Targets
-
-
Target
Dekont#17.07.2023.exe
-
Size
154KB
-
MD5
571ee58005b14af0965178929079625b
-
SHA1
c8df9921cfa7fde32269c058f1361c4f5f117935
-
SHA256
7501179eedf19e9b094ed763b880f4673998ecef6d8b4732985d04ee0ef1ea1e
-
SHA512
3f884a0d24e505fddd38d78363aff5f30ced6a29265a1e8342a301a3a56a7f7bf5646e2304212f5c9a9e6e3cf44df82314d1a4ac9d3b72a8782b23c62364d279
-
SSDEEP
3072:+NzPHk9MpcQbhvCa7XgwLrn0f3Inmq0vd8LI2eTTn99Gddwkqu8DfHrCj:+hRFhvt7XvLrna3Movd6eTCDzqRvrCj
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-