General
-
Target
Jetbrains_Dotpeek_1_1_1_keygen_by_FUTURiTY.exe
-
Size
2.4MB
-
Sample
240419-g6bxbabh3y
-
MD5
0aa3c4133cb0250b73636cb8e153d9e3
-
SHA1
2f7dc88b09144f68061918fc084962a5fa45ed41
-
SHA256
259de99ae56fc5101dc5e0d8a2f3b23d06de6d89b55c44b7b5c2675175a8ac51
-
SHA512
08f1e02fe6769c973f68ccbeccf304344c4ce1ba8fcf408c9e1eadc18866b804107acd0db9f6a77ed94c5a16b1f538ec9be2dd6db25e7a46ceb38878ceb952b5
-
SSDEEP
49152:k1hZXxmbHormNHOqsK3QTpBVY2PvApbVnZ82jRoxpJTlhqrlgqZE/AoC+:ehjKHCmNHJSTpjr8b39GDJTl8JgfAoV
Static task
static1
Behavioral task
behavioral1
Sample
Jetbrains_Dotpeek_1_1_1_keygen_by_FUTURiTY.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
azorult
http://gigaload.info/1210776429.php
Targets
-
-
Target
Jetbrains_Dotpeek_1_1_1_keygen_by_FUTURiTY.exe
-
Size
2.4MB
-
MD5
0aa3c4133cb0250b73636cb8e153d9e3
-
SHA1
2f7dc88b09144f68061918fc084962a5fa45ed41
-
SHA256
259de99ae56fc5101dc5e0d8a2f3b23d06de6d89b55c44b7b5c2675175a8ac51
-
SHA512
08f1e02fe6769c973f68ccbeccf304344c4ce1ba8fcf408c9e1eadc18866b804107acd0db9f6a77ed94c5a16b1f538ec9be2dd6db25e7a46ceb38878ceb952b5
-
SSDEEP
49152:k1hZXxmbHormNHOqsK3QTpBVY2PvApbVnZ82jRoxpJTlhqrlgqZE/AoC+:ehjKHCmNHJSTpjr8b39GDJTl8JgfAoV
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-