General
-
Target
eba735a9bee06932dd6ea4a0d7b67e68
-
Size
3.1MB
-
Sample
231228-vw2lwaacbn
-
MD5
eba735a9bee06932dd6ea4a0d7b67e68
-
SHA1
68fefa0d7ad14b5aead88ff247221a17a673e519
-
SHA256
38fbf0cd70656bc2ef5e2d10a0f44302d7e14b2de1dfb4b7fb4f64aa92fcd754
-
SHA512
e6d6796abc12d0c4f9ac10209394447800f7263b3a7e986174c24885b6aa1100035c3b0254e21e46fd2ce6e8f8aebcab2131c04fbd57ea3b3d582b6ecbda1b11
-
SSDEEP
98304:kdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8g:kdNB4ianUstYuUR2CSHsVP8g
Behavioral task
behavioral1
Sample
eba735a9bee06932dd6ea4a0d7b67e68.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
eba735a9bee06932dd6ea4a0d7b67e68
-
Size
3.1MB
-
MD5
eba735a9bee06932dd6ea4a0d7b67e68
-
SHA1
68fefa0d7ad14b5aead88ff247221a17a673e519
-
SHA256
38fbf0cd70656bc2ef5e2d10a0f44302d7e14b2de1dfb4b7fb4f64aa92fcd754
-
SHA512
e6d6796abc12d0c4f9ac10209394447800f7263b3a7e986174c24885b6aa1100035c3b0254e21e46fd2ce6e8f8aebcab2131c04fbd57ea3b3d582b6ecbda1b11
-
SSDEEP
98304:kdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8g:kdNB4ianUstYuUR2CSHsVP8g
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-