General
-
Target
055977f6e7f47decf7db3c37071ab461
-
Size
3.1MB
-
Sample
231224-tsxyvacbe3
-
MD5
055977f6e7f47decf7db3c37071ab461
-
SHA1
2efcdd61638cfe6b23fdd538bd1b98c84afa1f4a
-
SHA256
4476fe5ef44af31b5d1d99ba564cc6872678a1263bc047e82896eae1ebda70c7
-
SHA512
ba0af36c488539966e047b1891552b1ba5a74df199075929d2fc1052282453775f60f42bb16437cb9ba91fcee54d31ae8cfb97a5a6c516214da107f8ce34e4ad
-
SSDEEP
98304:EdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf82:EdNB4ianUstYuUR2CSHsVP82
Behavioral task
behavioral1
Sample
055977f6e7f47decf7db3c37071ab461.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
055977f6e7f47decf7db3c37071ab461
-
Size
3.1MB
-
MD5
055977f6e7f47decf7db3c37071ab461
-
SHA1
2efcdd61638cfe6b23fdd538bd1b98c84afa1f4a
-
SHA256
4476fe5ef44af31b5d1d99ba564cc6872678a1263bc047e82896eae1ebda70c7
-
SHA512
ba0af36c488539966e047b1891552b1ba5a74df199075929d2fc1052282453775f60f42bb16437cb9ba91fcee54d31ae8cfb97a5a6c516214da107f8ce34e4ad
-
SSDEEP
98304:EdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf82:EdNB4ianUstYuUR2CSHsVP82
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-