General
-
Target
Copy0761000025.xlsm
-
Size
430KB
-
Sample
240531-j5p4nach79
-
MD5
d01710a02c214a5f6e0197fd291c0b10
-
SHA1
3b2ed35df644d1684660543c56370dc8686e1a53
-
SHA256
b18796fe4a4cf8e20e1a54ec3773c819533cb15a545093d1c6e19ce14efaa93d
-
SHA512
45abdcf42ec483103948e2882bd8187e98ae44af425bdad5f0b1f17b99b336e80acc322c419fdab5cbc8f601993359a0e383c14927a286200c70c1044850e9e5
-
SSDEEP
12288:7fEXQu7SHOCZhSTIS2dGpeWpqivD1YxR25O8UM:7VwarmMSAGMID1R5OtM
Behavioral task
behavioral1
Sample
Copy0761000025.xlsm
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Copy0761000025.xlsm
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
Copy0761000025.xlsm
-
Size
430KB
-
MD5
d01710a02c214a5f6e0197fd291c0b10
-
SHA1
3b2ed35df644d1684660543c56370dc8686e1a53
-
SHA256
b18796fe4a4cf8e20e1a54ec3773c819533cb15a545093d1c6e19ce14efaa93d
-
SHA512
45abdcf42ec483103948e2882bd8187e98ae44af425bdad5f0b1f17b99b336e80acc322c419fdab5cbc8f601993359a0e383c14927a286200c70c1044850e9e5
-
SSDEEP
12288:7fEXQu7SHOCZhSTIS2dGpeWpqivD1YxR25O8UM:7VwarmMSAGMID1R5OtM
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-