Behavioral task
behavioral1
Sample
2232-15-0x0000000000400000-0x0000000000486000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2232-15-0x0000000000400000-0x0000000000486000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
2232-15-0x0000000000400000-0x0000000000486000-memory.dmp
-
Size
536KB
-
MD5
37fa547c8a069c9b3e8599e94c80307c
-
SHA1
01888d114a0e63016da68bbb652384c0a255bf29
-
SHA256
aad551988c378e8cb12d4037852b982dacaad840a68eb99e7bac2eddcf1ae1cd
-
SHA512
f06489fdfc03842979ad4df0d174e767e755f8d7806e8add14ff2884de624d572adaea2ac7c2d1797c0485bcdf75971e31e684eeda5229d8bdaac44029f71ae2
-
SSDEEP
12288:uF2a4qQrwbqCeaE/FTYBNwqSDa0VeS/Dxv6dPwNzzpJdKZ:y23rwbqJp+Nwqs/d6d4Nz
Malware Config
Extracted
azorult
http://benchadcrd.nl/gate.php
Signatures
Files
-
2232-15-0x0000000000400000-0x0000000000486000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 288KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 239KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE