General
-
Target
68b53507bfc36e79ffd4ffbcdefec6e7
-
Size
3.1MB
-
Sample
240119-1lw7asefh7
-
MD5
68b53507bfc36e79ffd4ffbcdefec6e7
-
SHA1
92c474d188287913cb3c404e5c286de578e59ea9
-
SHA256
bab256aaf0fd8ee5010aef26054bbeac7c75b38be2fd04ce8f0293ad2da9030a
-
SHA512
94c4a3c9dd179bbf2b407018b4ab7f8eb9fa9b022693206b2c8ffe23b72da7a1166c92079a72a5a77906ca88690b811b7fb9dc517030551f26f9433fdca44d30
-
SSDEEP
98304:OdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:OdNB4ianUstYuUR2CSHsVP8x
Behavioral task
behavioral1
Sample
68b53507bfc36e79ffd4ffbcdefec6e7.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
68b53507bfc36e79ffd4ffbcdefec6e7
-
Size
3.1MB
-
MD5
68b53507bfc36e79ffd4ffbcdefec6e7
-
SHA1
92c474d188287913cb3c404e5c286de578e59ea9
-
SHA256
bab256aaf0fd8ee5010aef26054bbeac7c75b38be2fd04ce8f0293ad2da9030a
-
SHA512
94c4a3c9dd179bbf2b407018b4ab7f8eb9fa9b022693206b2c8ffe23b72da7a1166c92079a72a5a77906ca88690b811b7fb9dc517030551f26f9433fdca44d30
-
SSDEEP
98304:OdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:OdNB4ianUstYuUR2CSHsVP8x
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-