General
-
Target
Exclusive_Pgware_6_Softwares_keygen.exe
-
Size
2MB
-
Sample
230722-hgcb8ahg94
-
MD5
07a6aa420c782294f4e7437a4a257766
-
SHA1
1d919dc293f3ae6db2b198b3a30c5dd9c66d9368
-
SHA256
b1bbd92fe1eb0cafb8fa6b6bd9d88b3a07cba5bf4449bace2169fc2e645c864f
-
SHA512
f74239f555313f101edf4a510b0cfecd38ee1e7856e383ec81788b65b432f7cefae87333ff31506861af60c14397d2c7d117df61dc569a9a6a741a5125cbc334
-
SSDEEP
49152:IBJR32p1lGLJESvCYFp9nqaly1drgt+dxDMfyOgzXjrugLf1:yL32O5CYFHm/4+zQ6ddR
Static task
static1
Behavioral task
behavioral1
Sample
Exclusive_Pgware_6_Softwares_keygen.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Exclusive_Pgware_6_Softwares_keygen.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
https://www.connectingkeralam.com/wp-content/uploads/debug2.ps1
Extracted
azorult
http://domcomp.info/1210776429.php
Extracted
pony
http://top.thisispw.com/keys7369921/gate.php
Targets
-
-
Target
Exclusive_Pgware_6_Softwares_keygen.exe
-
Size
2MB
-
MD5
07a6aa420c782294f4e7437a4a257766
-
SHA1
1d919dc293f3ae6db2b198b3a30c5dd9c66d9368
-
SHA256
b1bbd92fe1eb0cafb8fa6b6bd9d88b3a07cba5bf4449bace2169fc2e645c864f
-
SHA512
f74239f555313f101edf4a510b0cfecd38ee1e7856e383ec81788b65b432f7cefae87333ff31506861af60c14397d2c7d117df61dc569a9a6a741a5125cbc334
-
SSDEEP
49152:IBJR32p1lGLJESvCYFp9nqaly1drgt+dxDMfyOgzXjrugLf1:yL32O5CYFHm/4+zQ6ddR
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-