Overview
overview
10Static
static
3??????????...??.exe
windows7-x64
??????????...??.exe
windows10-2004-x64
10??????????...??.exe
android-9-x86
??????????...??.exe
android-10-x64
??????????...??.exe
android-11-x64
??????????...??.exe
macos-10.15-amd64
??????????...??.exe
ubuntu-18.04-amd64
??????????...??.exe
debian-9-armhf
??????????...??.exe
debian-9-mips
??????????...??.exe
debian-9-mipsel
General
-
Target
??????????? ??????????????.exe
-
Size
234KB
-
Sample
231116-y6snhage4w
-
MD5
38d378ff52ea3dba53a07eee3ed769c7
-
SHA1
94181ebcbe353d496701681b6bd03e06c1c63751
-
SHA256
0791c43de42272d1f5eb20ee67b0ad4194e2bb8f00975aa906605d8cd0c4c6a4
-
SHA512
ab096595c92f3bca5659b2156e3daed47f70dd8ab3ddff1506ff164a50fa4d15f2503776d43633056ebcb569255295f8f7af53a031f552da1a3f73d017c105cc
-
SSDEEP
6144:gYa6oBsctoZqfq4S4JV2p9wubvEjRTsObhUXLbPp:gYxcCZqHp2prEVs+C7F
Static task
static1
Behavioral task
behavioral1
Sample
??????????? ??????????????.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
??????????? ??????????????.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
??????????? ??????????????.exe
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral4
Sample
??????????? ??????????????.exe
Resource
android-x64-20231023.1-en
Behavioral task
behavioral5
Sample
??????????? ??????????????.exe
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral6
Sample
??????????? ??????????????.exe
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
??????????? ??????????????.exe
Resource
ubuntu1804-amd64-20231026-en
Behavioral task
behavioral8
Sample
??????????? ??????????????.exe
Resource
debian9-armhf-20231026-en
Behavioral task
behavioral9
Sample
??????????? ??????????????.exe
Resource
debian9-mipsbe-20231026-en
Behavioral task
behavioral10
Sample
??????????? ??????????????.exe
Resource
debian9-mipsel-20231026-en
Malware Config
Extracted
azorult
http://141.98.6.162/office/index.php
Targets
-
-
Target
??????????? ??????????????.exe
-
Size
234KB
-
MD5
38d378ff52ea3dba53a07eee3ed769c7
-
SHA1
94181ebcbe353d496701681b6bd03e06c1c63751
-
SHA256
0791c43de42272d1f5eb20ee67b0ad4194e2bb8f00975aa906605d8cd0c4c6a4
-
SHA512
ab096595c92f3bca5659b2156e3daed47f70dd8ab3ddff1506ff164a50fa4d15f2503776d43633056ebcb569255295f8f7af53a031f552da1a3f73d017c105cc
-
SSDEEP
6144:gYa6oBsctoZqfq4S4JV2p9wubvEjRTsObhUXLbPp:gYxcCZqHp2prEVs+C7F
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Event Triggered Execution
1Change Default File Association
1Defense Evasion
Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1