Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
d4c7576ec36d8ed8da8385f11181f4c6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4c7576ec36d8ed8da8385f11181f4c6.exe
Resource
win10v2004-20240226-en
General
-
Target
d4c7576ec36d8ed8da8385f11181f4c6.exe
-
Size
165KB
-
MD5
d4c7576ec36d8ed8da8385f11181f4c6
-
SHA1
e6893e2b038cc15aba28e28f1ab482ffa576be9b
-
SHA256
c43f6a8baf0ad84ca756e83e47f6b47fb6cd99290d64492ee714caf04b40bfee
-
SHA512
aad0159c4d07083c5a764b45a7216e8812babb7d5d64d0b59c20b3cd1a38657e48cbe00da58b15d8168427bd41a0b3781eeeb8524e246b30cb554f44d30e9252
-
SSDEEP
3072:c45ftw60k65MOcsWkLLSsMyJ6ooYzsAdTmCCk+dj:ZUcsWkLesb63BGN
Malware Config
Extracted
azorult
http://finlzzm.com/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 756 3096 WerFault.exe d4c7576ec36d8ed8da8385f11181f4c6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4c7576ec36d8ed8da8385f11181f4c6.exe"C:\Users\Admin\AppData\Local\Temp\d4c7576ec36d8ed8da8385f11181f4c6.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 13922⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3096 -ip 30961⤵