General
-
Target
E-dekont.exe
-
Size
1.2MB
-
Sample
231207-p5t1haba39
-
MD5
3cb8cabac5dc5a0d0eef27cb5c90792d
-
SHA1
55a0e52a05ef20f05b8adab1e5a630a76fadc127
-
SHA256
27109cdaf4aeaf0ac18509837787301469487e25f02ab5a1c63cb570d795334a
-
SHA512
a14a1fbcc87a120b73145e536be4e6b5c24871d040734c2dbaf1ed46b8f624dcfddc076aa353754a105452a8913bd0d07c7c1a35856347a9e76a1b6d997a6015
-
SSDEEP
24576:6Fd6Ri85AtkfEZOpZJ3uI7aYOyD9dL5TAm9mRm8YbX1niRUw:mdcinPmr7asjL5ThcUX1Sv
Static task
static1
Behavioral task
behavioral1
Sample
E-dekont.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
E-dekont.exe
Resource
win10v2004-20231130-en
Malware Config
Targets
-
-
Target
E-dekont.exe
-
Size
1.2MB
-
MD5
3cb8cabac5dc5a0d0eef27cb5c90792d
-
SHA1
55a0e52a05ef20f05b8adab1e5a630a76fadc127
-
SHA256
27109cdaf4aeaf0ac18509837787301469487e25f02ab5a1c63cb570d795334a
-
SHA512
a14a1fbcc87a120b73145e536be4e6b5c24871d040734c2dbaf1ed46b8f624dcfddc076aa353754a105452a8913bd0d07c7c1a35856347a9e76a1b6d997a6015
-
SSDEEP
24576:6Fd6Ri85AtkfEZOpZJ3uI7aYOyD9dL5TAm9mRm8YbX1niRUw:mdcinPmr7asjL5ThcUX1Sv
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-