Analysis

  • max time kernel
    98s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-02-2024 22:45

General

  • Target

    a78a776af8c45d3118cb60055c628eeb.exe

  • Size

    112KB

  • MD5

    a78a776af8c45d3118cb60055c628eeb

  • SHA1

    8d5bfe502107e1f861479d63e8f9d031f615c220

  • SHA256

    051181928db67fbc03e33992d94c33dc703c926c149a5eb2c5640140cdbf3afa

  • SHA512

    7d7bee361fdd5471db52357beded54e4f2bdd989746a1d2b679da798427c4df307901ceb2259111694cc608c5a72da6fa58c56f2c392c21dd28c888a27eb7053

  • SSDEEP

    3072:vuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SgyWJmFIDlVim5:/zx7ZApszolIo7lf/igRpDlVim

Malware Config

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a78a776af8c45d3118cb60055c628eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\a78a776af8c45d3118cb60055c628eeb.exe"
    1⤵
      PID:3048

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3048-0-0x0000000000400000-0x000000000041FC00-memory.dmp
      Filesize

      127KB