General
-
Target
54032544a980d08bd975132873c52dee
-
Size
3.1MB
-
Sample
240111-txz9rscab6
-
MD5
54032544a980d08bd975132873c52dee
-
SHA1
7d7fc5587816b1d1669068dc9286b220f4d21e45
-
SHA256
739a134a3d71b82e09236c25ebe711824150ab07e5e2260cbdc1b9bca48bf5cc
-
SHA512
6ebd88cdbd96832642cef9f72781fb8b3a6e641303281906dd5269044aa77c49a8c6aabd64c4f7c69d939c201c71c2b80448cae127a11ba74d39b67d8205f8ef
-
SSDEEP
98304:QdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8l:QdNB4ianUstYuUR2CSHsVP8l
Behavioral task
behavioral1
Sample
54032544a980d08bd975132873c52dee.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
54032544a980d08bd975132873c52dee
-
Size
3.1MB
-
MD5
54032544a980d08bd975132873c52dee
-
SHA1
7d7fc5587816b1d1669068dc9286b220f4d21e45
-
SHA256
739a134a3d71b82e09236c25ebe711824150ab07e5e2260cbdc1b9bca48bf5cc
-
SHA512
6ebd88cdbd96832642cef9f72781fb8b3a6e641303281906dd5269044aa77c49a8c6aabd64c4f7c69d939c201c71c2b80448cae127a11ba74d39b67d8205f8ef
-
SSDEEP
98304:QdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8l:QdNB4ianUstYuUR2CSHsVP8l
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-