General
-
Target
23941d12046f5a430d4ea87494091743
-
Size
452KB
-
Sample
231225-q9fjcaffb3
-
MD5
23941d12046f5a430d4ea87494091743
-
SHA1
476fcec06271d128340b5e0190647cd6484c6673
-
SHA256
8d7c354cc8866c00da25ffb73d535596f4f77ca8ce7c0312bd39db103aa3403c
-
SHA512
1f2bd49c21a953e53de0890c45feec71b0aa02c0d7caef875e0bc9ff30863199ffc39dac3f6721e84a7829483457ebc05ddfa7587ac701568b5f89194352bf86
-
SSDEEP
12288:JBuaG/EM0/3YM0zEYQOE9EVSb0FEs2c/ATcqSqQIn:7uaGbqQ4b0550cSJ
Static task
static1
Behavioral task
behavioral1
Sample
23941d12046f5a430d4ea87494091743.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23941d12046f5a430d4ea87494091743.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
gpmaw.duckdns.org:3040
gpmaw.duckdns.org:2020
gpmaw.duckdns.org:4040
hpdndbnb.duckdns.org:3040
hpdndbnb.duckdns.org:2020
hpdndbnb.duckdns.org:4040
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
Acrobat Reader .exe
-
install_folder
%AppData%
Extracted
azorult
http://truthbetoldlvlup.onlinewebshop.net/mf/index.php
Targets
-
-
Target
23941d12046f5a430d4ea87494091743
-
Size
452KB
-
MD5
23941d12046f5a430d4ea87494091743
-
SHA1
476fcec06271d128340b5e0190647cd6484c6673
-
SHA256
8d7c354cc8866c00da25ffb73d535596f4f77ca8ce7c0312bd39db103aa3403c
-
SHA512
1f2bd49c21a953e53de0890c45feec71b0aa02c0d7caef875e0bc9ff30863199ffc39dac3f6721e84a7829483457ebc05ddfa7587ac701568b5f89194352bf86
-
SSDEEP
12288:JBuaG/EM0/3YM0zEYQOE9EVSb0FEs2c/ATcqSqQIn:7uaGbqQ4b0550cSJ
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-