General
-
Target
DRAFT BILL OF LADING.PDF.vbs
-
Size
27KB
-
Sample
240312-h2m98abc9z
-
MD5
8ce482c332e9ec80d47c64edc65b6a70
-
SHA1
c4ceaf9bf0791068f650f28674f09ac345bdc3cd
-
SHA256
1562364a3048ef8e00720e3bc0c6588ed7a4d8f560c5bdafa5b19503e159a8a8
-
SHA512
3471397b056c668363b309fa26374a849e02b3a191a0f4a1ac33f723e8358fda9911faadd9927f65f424e974a3ab6f2c88406bb4880ce88155ab172465126886
-
SSDEEP
768:4OMHs3w3rf5xGsmKQblBW2MQK/fFXSiP10E:403w3rDTpQZjOSiPD
Static task
static1
Behavioral task
behavioral1
Sample
DRAFT BILL OF LADING.PDF.vbs
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DRAFT BILL OF LADING.PDF.vbs
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
DRAFT BILL OF LADING.PDF.vbs
-
Size
27KB
-
MD5
8ce482c332e9ec80d47c64edc65b6a70
-
SHA1
c4ceaf9bf0791068f650f28674f09ac345bdc3cd
-
SHA256
1562364a3048ef8e00720e3bc0c6588ed7a4d8f560c5bdafa5b19503e159a8a8
-
SHA512
3471397b056c668363b309fa26374a849e02b3a191a0f4a1ac33f723e8358fda9911faadd9927f65f424e974a3ab6f2c88406bb4880ce88155ab172465126886
-
SSDEEP
768:4OMHs3w3rf5xGsmKQblBW2MQK/fFXSiP10E:403w3rDTpQZjOSiPD
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-