General
-
Target
99d1661adfbaf9cd2d4bdbeec165786a
-
Size
3.1MB
-
Sample
240213-wx8bgsga83
-
MD5
99d1661adfbaf9cd2d4bdbeec165786a
-
SHA1
ae498e890be1c7047c28d29d51fe27712efbb871
-
SHA256
5785ad85a293567163d30e6dc31f0c9bdf62f0c39ea84bcf92f1e3884d0cb33d
-
SHA512
c49d961d0528847bffa2b5935e0378c6bf87886fbe7db90bdc756e1580c6b21651ebe61bfa56bfbce00d44f5f8fd471868b5129346a19bbb5bba22adfaef75f1
-
SSDEEP
98304:wdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8M:wdNB4ianUstYuUR2CSHsVP8M
Behavioral task
behavioral1
Sample
99d1661adfbaf9cd2d4bdbeec165786a.exe
Resource
win7-20231215-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
99d1661adfbaf9cd2d4bdbeec165786a
-
Size
3.1MB
-
MD5
99d1661adfbaf9cd2d4bdbeec165786a
-
SHA1
ae498e890be1c7047c28d29d51fe27712efbb871
-
SHA256
5785ad85a293567163d30e6dc31f0c9bdf62f0c39ea84bcf92f1e3884d0cb33d
-
SHA512
c49d961d0528847bffa2b5935e0378c6bf87886fbe7db90bdc756e1580c6b21651ebe61bfa56bfbce00d44f5f8fd471868b5129346a19bbb5bba22adfaef75f1
-
SSDEEP
98304:wdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8M:wdNB4ianUstYuUR2CSHsVP8M
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-