General
-
Target
PO-S518740 #OR23298-RH.exe
-
Size
282KB
-
Sample
230720-l58bcafc88
-
MD5
cef96968fc8be786444d79dd5ab45e16
-
SHA1
492011f92d309b26baceb2f7a70c6983bd8767cb
-
SHA256
fa71bbc6871f13271d6fae0f9a16dcb44961e7c9730baa8efb86999f06ea7105
-
SHA512
902e8a425a93556d364e50c20241d28cef7c913b4037ff6fda7aac8ddef78c4360cf446f9bd0e70ad8e92857b3ab2dece5b615387e1f045bdc6e9948e72577d0
-
SSDEEP
6144:ajC8w75wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww5w5wwwwwwx:z8w75wwwwwwwwwwwwwwwwwwwwwwwwwwJ
Static task
static1
Behavioral task
behavioral1
Sample
PO-S518740 #OR23298-RH.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PO-S518740 #OR23298-RH.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
azorult
http://mlch1.shop/Mlch1/index.php
Targets
-
-
Target
PO-S518740 #OR23298-RH.exe
-
Size
282KB
-
MD5
cef96968fc8be786444d79dd5ab45e16
-
SHA1
492011f92d309b26baceb2f7a70c6983bd8767cb
-
SHA256
fa71bbc6871f13271d6fae0f9a16dcb44961e7c9730baa8efb86999f06ea7105
-
SHA512
902e8a425a93556d364e50c20241d28cef7c913b4037ff6fda7aac8ddef78c4360cf446f9bd0e70ad8e92857b3ab2dece5b615387e1f045bdc6e9948e72577d0
-
SSDEEP
6144:ajC8w75wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww5w5wwwwwwx:z8w75wwwwwwwwwwwwwwwwwwwwwwwwwwJ
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-