General
-
Target
4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74.exe
-
Size
1.2MB
-
Sample
240830-brnpnszgqb
-
MD5
45da35e12be2e8a17e6acf41f682c7f9
-
SHA1
cdaccd6ed6bbc405666a5d06a9001d116153f56b
-
SHA256
4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74
-
SHA512
d6217abfd71bbe8e84a963a8cb399048f19f3a43aa8b820c2771502c6b4ff790458f22ef1e6c5d00bacd2ccf783da606d0b987169b1281b01dd920f5ad12d493
-
SSDEEP
24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aiQi9co:STvC/MTQYxsWR7aiQiC
Static task
static1
Behavioral task
behavioral1
Sample
4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
azorult
http://ln6b9.shop/LN341/index.php
Targets
-
-
Target
4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74.exe
-
Size
1.2MB
-
MD5
45da35e12be2e8a17e6acf41f682c7f9
-
SHA1
cdaccd6ed6bbc405666a5d06a9001d116153f56b
-
SHA256
4a0dc5e1271e90a5fa81a2b042bb1b6f3eaef6159a8a3b07c563a8ca90fa7a74
-
SHA512
d6217abfd71bbe8e84a963a8cb399048f19f3a43aa8b820c2771502c6b4ff790458f22ef1e6c5d00bacd2ccf783da606d0b987169b1281b01dd920f5ad12d493
-
SSDEEP
24576:SqDEvCTbMWu7rQYlBQcBiT6rprG8aiQi9co:STvC/MTQYxsWR7aiQiC
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-