General
-
Target
cfd84216dcdfb64d79015a7ff28d312a
-
Size
3.1MB
-
Sample
240317-ebezdadf76
-
MD5
cfd84216dcdfb64d79015a7ff28d312a
-
SHA1
c652c4ef5823b3b218f69c6f97f688979d694dab
-
SHA256
002b4322cb6cbe7f44decb3b858470cfb309b1f80f1f3d39df2bf19058433bb2
-
SHA512
c77f9e585b0002dfe71e8db3613b9f32cd125434869e0b65d5f8fa233902053cd97069f63e37c55fb638b74aa1a8d8e3c27d25873c9d2d01826855f84f139e09
-
SSDEEP
98304:TdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8m:TdNB4ianUstYuUR2CSHsVP8m
Behavioral task
behavioral1
Sample
cfd84216dcdfb64d79015a7ff28d312a.exe
Resource
win7-20240221-en
Malware Config
Extracted
netwire
174.127.99.159:7882
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
May-B
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
azorult
https://gemateknindoperkasa.co.id/imag/index.php
Targets
-
-
Target
cfd84216dcdfb64d79015a7ff28d312a
-
Size
3.1MB
-
MD5
cfd84216dcdfb64d79015a7ff28d312a
-
SHA1
c652c4ef5823b3b218f69c6f97f688979d694dab
-
SHA256
002b4322cb6cbe7f44decb3b858470cfb309b1f80f1f3d39df2bf19058433bb2
-
SHA512
c77f9e585b0002dfe71e8db3613b9f32cd125434869e0b65d5f8fa233902053cd97069f63e37c55fb638b74aa1a8d8e3c27d25873c9d2d01826855f84f139e09
-
SSDEEP
98304:TdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8m:TdNB4ianUstYuUR2CSHsVP8m
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
NetWire RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-