General
-
Target
ekstre.exe
-
Size
1.2MB
-
Sample
231207-hmg5nahfhj
-
MD5
8fcee5dc3d70f71f15a9b52961ff6d2c
-
SHA1
58c79faadb701e92f87ef182372f6ffca2863724
-
SHA256
8b02f1da039c68a34c1c6eeb5879d60af07953e8d9fbbbd8e61f3d7d06d8a529
-
SHA512
01747d96bfbc9c9e5c28f5c8df40515900b1e56f3f31aebbe38a35cb4638d4b612f9c855491109231740476475b0c30446396ad66d1a5b11d3ec2747cbf497f8
-
SSDEEP
24576:9Fd6jHjNhTGtCz7d/VOctYx8a5YQ4uUhatnIIix7Yu+5EkW4FI:TdyDHyCzx/Ox8a5uhjICQ9FI
Static task
static1
Behavioral task
behavioral1
Sample
ekstre.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
ekstre.exe
Resource
win10v2004-20231127-en
Malware Config
Targets
-
-
Target
ekstre.exe
-
Size
1.2MB
-
MD5
8fcee5dc3d70f71f15a9b52961ff6d2c
-
SHA1
58c79faadb701e92f87ef182372f6ffca2863724
-
SHA256
8b02f1da039c68a34c1c6eeb5879d60af07953e8d9fbbbd8e61f3d7d06d8a529
-
SHA512
01747d96bfbc9c9e5c28f5c8df40515900b1e56f3f31aebbe38a35cb4638d4b612f9c855491109231740476475b0c30446396ad66d1a5b11d3ec2747cbf497f8
-
SSDEEP
24576:9Fd6jHjNhTGtCz7d/VOctYx8a5YQ4uUhatnIIix7Yu+5EkW4FI:TdyDHyCzx/Ox8a5uhjICQ9FI
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-