General
-
Target
.
-
Size
146KB
-
Sample
240401-hyfqzagf48
-
MD5
4a34f0fe376769a3f7d9929d789098f8
-
SHA1
eb79a7c4b9899c43bfcf1f8c0cbd388fc1e14472
-
SHA256
d20abd749e459f34d62daeed2e23443883d9eec5e58e578513a92420bb69974b
-
SHA512
a7796fb412fd2c874b75843771d95ad947b0dba60447b054a7c7f7a8ad3fb2dd992f419f18360b09517d0317daadd3daa1efc3aab89d35ad3558442b81828f70
-
SSDEEP
1536:o4kyd8LFVMUK4DgnVR4DBllKoVkL30vD9329s4D+HhqiE:BkzLFoVsllXmxYHhqiE
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win11-20240214-en
Malware Config
Extracted
azorult
http://boglogov.site/index.php
Targets
-
-
Target
.
-
Size
146KB
-
MD5
4a34f0fe376769a3f7d9929d789098f8
-
SHA1
eb79a7c4b9899c43bfcf1f8c0cbd388fc1e14472
-
SHA256
d20abd749e459f34d62daeed2e23443883d9eec5e58e578513a92420bb69974b
-
SHA512
a7796fb412fd2c874b75843771d95ad947b0dba60447b054a7c7f7a8ad3fb2dd992f419f18360b09517d0317daadd3daa1efc3aab89d35ad3558442b81828f70
-
SSDEEP
1536:o4kyd8LFVMUK4DgnVR4DBllKoVkL30vD9329s4D+HhqiE:BkzLFoVsllXmxYHhqiE
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Blocks application from running via registry modification
Adds application to list of disallowed applications.
-
Downloads MZ/PE file
-
Stops running service(s)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Modifies WinLogon
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2