General
-
Target
8fd834d50fcf0a75f3e292eb9a96dd0d
-
Size
3.1MB
-
Sample
240204-w3h9jsabfj
-
MD5
8fd834d50fcf0a75f3e292eb9a96dd0d
-
SHA1
d1cda5400cf55f9ae17e5b811d50c0687fbae9b7
-
SHA256
a73c6c008b4700763c2819dca02e2d95772d879b1d74d5be1253859a108012cb
-
SHA512
d2a4ba127b4cfc546369fc27eeef782aefc17f01449d4e3f8bda6a2135995b58bebe507518cdefc0f31bfbe432f6dbd9cf74e1c9ef938c5585794ed6979fc498
-
SSDEEP
98304:MdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8a:MdNB4ianUstYuUR2CSHsVP8a
Behavioral task
behavioral1
Sample
8fd834d50fcf0a75f3e292eb9a96dd0d.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
8fd834d50fcf0a75f3e292eb9a96dd0d
-
Size
3.1MB
-
MD5
8fd834d50fcf0a75f3e292eb9a96dd0d
-
SHA1
d1cda5400cf55f9ae17e5b811d50c0687fbae9b7
-
SHA256
a73c6c008b4700763c2819dca02e2d95772d879b1d74d5be1253859a108012cb
-
SHA512
d2a4ba127b4cfc546369fc27eeef782aefc17f01449d4e3f8bda6a2135995b58bebe507518cdefc0f31bfbe432f6dbd9cf74e1c9ef938c5585794ed6979fc498
-
SSDEEP
98304:MdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8a:MdNB4ianUstYuUR2CSHsVP8a
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-