General
-
Target
Autodesk_AutoCAD_2023_License_keygen_by_KeyGenGuru.exe
-
Size
2.1MB
-
Sample
240826-vyqbmawckh
-
MD5
9f52f0ddebef7dae9a591cebf727d9ef
-
SHA1
22f45518e1427cf9965ee8da400f1d05b9736438
-
SHA256
edbe03f74167f65d2c416d8dd7dd809ecbcc39b1dcdbd9fb8a7797503170e5db
-
SHA512
af3ac899069cf06dcdcd327088a2a7824b9bd61c5a3b7717368ceef2b566698a81568c45c623434e59ffb33333d6ffc0d74caef693e491685941bf84bf31206d
-
SSDEEP
49152:k1hZXsEWG8ZyKyWoMdUeruPBFO2G73MEAmTP:eh79tjW3Uh5E2k6CP
Static task
static1
Behavioral task
behavioral1
Sample
Autodesk_AutoCAD_2023_License_keygen_by_KeyGenGuru.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Autodesk_AutoCAD_2023_License_keygen_by_KeyGenGuru.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Autodesk_AutoCAD_2023_License_keygen_by_KeyGenGuru.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Autodesk_AutoCAD_2023_License_keygen_by_KeyGenGuru.exe
Resource
win11-20240802-en
Malware Config
Extracted
azorult
http://gigaload.click/1210776429.php
Extracted
pony
http://top.enkey.click/bussin/gate.php
Targets
-
-
Target
Autodesk_AutoCAD_2023_License_keygen_by_KeyGenGuru.exe
-
Size
2.1MB
-
MD5
9f52f0ddebef7dae9a591cebf727d9ef
-
SHA1
22f45518e1427cf9965ee8da400f1d05b9736438
-
SHA256
edbe03f74167f65d2c416d8dd7dd809ecbcc39b1dcdbd9fb8a7797503170e5db
-
SHA512
af3ac899069cf06dcdcd327088a2a7824b9bd61c5a3b7717368ceef2b566698a81568c45c623434e59ffb33333d6ffc0d74caef693e491685941bf84bf31206d
-
SSDEEP
49152:k1hZXsEWG8ZyKyWoMdUeruPBFO2G73MEAmTP:eh79tjW3Uh5E2k6CP
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
7Credentials In Files
6Credentials in Registry
1