Behavioral task
behavioral1
Sample
2684-32-0x00000000004A0000-0x0000000001502000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2684-32-0x00000000004A0000-0x0000000001502000-memory.exe
Resource
win10v2004-20231222-en
General
-
Target
2684-32-0x00000000004A0000-0x0000000001502000-memory.dmp
-
Size
16.4MB
-
MD5
2227a6c967994e6dcdbcd570e45f1794
-
SHA1
8a9ce886b29662607e19c4775a5904ea7dcc8349
-
SHA256
e49ec886e495c1af1ec8f3c41c5125829aebc36dd93504188811091404e3655c
-
SHA512
15298b1e6c111bbe54a9d417ef0db32b6e71001be95e7956355c10eb0a2ea8b9af2326cc2a9259e6e072ce499d0b0144426f598d668bff93864b60a1e85e859b
-
SSDEEP
3072:KNMJvEraycgC0K86lsSXJNh6y1ZSQsuWayMXrq:rz15sC6eWM2
Malware Config
Signatures
-
Azorult family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2684-32-0x00000000004A0000-0x0000000001502000-memory.dmp
Files
-
2684-32-0x00000000004A0000-0x0000000001502000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ