General
-
Target
https://samples.vx-underground.org/Samples/Families/Azorult/571de4698edff95c328d3521b11e800a3b9659ad55281dd7729b2ce2210ac931.7z
-
Sample
240311-smvqvsdh9s
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://samples.vx-underground.org/Samples/Families/Azorult/571de4698edff95c328d3521b11e800a3b9659ad55281dd7729b2ce2210ac931.7z
Resource
win10v2004-20240226-en
10 signatures
300 seconds
Malware Config
Extracted
Family
azorult
C2
http://185.189.151.50/7yhnm434/index.php
Targets
-
-
Target
https://samples.vx-underground.org/Samples/Families/Azorult/571de4698edff95c328d3521b11e800a3b9659ad55281dd7729b2ce2210ac931.7z
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-