General
-
Target
71ef25e981660e629be9ef17721aa027
-
Size
3.1MB
-
Sample
240124-l2dbssfecl
-
MD5
71ef25e981660e629be9ef17721aa027
-
SHA1
7131f8d2fcd8535f64b99941c15ba2981eb3fc41
-
SHA256
3e07b8aeb1304e0c420aec869a2f407558a88cac7d510c9f86a0f737846ad1e0
-
SHA512
c2cf6c60646ad224ba2ccee9f5a5319c295dde4e1fbca58b25a8494cb57ed748c47d2a61eac8b6b8a4f648ec2b25083eede0809b6876770a9919ea9e821ec025
-
SSDEEP
98304:6dNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:6dNB4ianUstYuUR2CSHsVP8x
Behavioral task
behavioral1
Sample
71ef25e981660e629be9ef17721aa027.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
71ef25e981660e629be9ef17721aa027
-
Size
3.1MB
-
MD5
71ef25e981660e629be9ef17721aa027
-
SHA1
7131f8d2fcd8535f64b99941c15ba2981eb3fc41
-
SHA256
3e07b8aeb1304e0c420aec869a2f407558a88cac7d510c9f86a0f737846ad1e0
-
SHA512
c2cf6c60646ad224ba2ccee9f5a5319c295dde4e1fbca58b25a8494cb57ed748c47d2a61eac8b6b8a4f648ec2b25083eede0809b6876770a9919ea9e821ec025
-
SSDEEP
98304:6dNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:6dNB4ianUstYuUR2CSHsVP8x
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-