Behavioral task
behavioral1
Sample
1260-55-0x0000000000400000-0x0000000000A69000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1260-55-0x0000000000400000-0x0000000000A69000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
1260-55-0x0000000000400000-0x0000000000A69000-memory.dmp
-
Size
6.4MB
-
MD5
4704cb18cce7b6cca8f270de25b9a890
-
SHA1
caff8f744d9acb407c5634e1090999d5edae912e
-
SHA256
b316827c856595acf0738ee063c85e8bf548bc7b9ae4934b8abf1a85cc9ba59b
-
SHA512
eea344d6d138d86247bd856cb58d54408c5d039ff833eee3c5c316c2a172ee740fb310970c8dd1a260e021dee3ea2a64c296692a0bc9fb8d873c5c280e0f56ac
-
SSDEEP
98304:sxXu84KkmYbQ43ALUEewU4s5lW6J2vpKQx7AQCeqH46BKdi3+wbHIOpGNNhsmJAh:ehYE56J8p97Aai3NbHy+mW9QMH9Q
Malware Config
Extracted
azorult
http://198.98.54.161/panel/index.php
Signatures
Files
-
1260-55-0x0000000000400000-0x0000000000A69000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 48KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.4MB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ