General
-
Target
8F391DB2FC8B0C6BE72425CD5E8F8369.exe
-
Size
962KB
-
Sample
240908-dwbl1svdlf
-
MD5
8f391db2fc8b0c6be72425cd5e8f8369
-
SHA1
c94fa3368eb4946aad49c82a613d3cbe40266a60
-
SHA256
856d0a974a7e4eefc2d79baaf9ff34aacc6cf0f721804299fbff8d90c661e190
-
SHA512
8c65188147f98b7142cde942401cc2ff4cac58eb087e9f4830b62a8770a8a2606d4d2cd565c916c20dffdabfd3ede441d7c64cdafb45b38ee71b4f410f3a006b
-
SSDEEP
24576:eAHnh+eWsN3skA4RV1Hom2KXMmHasDoW7nuf5:Jh+ZkldoPK8YasEWK
Static task
static1
Behavioral task
behavioral1
Sample
8F391DB2FC8B0C6BE72425CD5E8F8369.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8F391DB2FC8B0C6BE72425CD5E8F8369.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
azorult
http://k6j8.shop/OY341/index.php
Targets
-
-
Target
8F391DB2FC8B0C6BE72425CD5E8F8369.exe
-
Size
962KB
-
MD5
8f391db2fc8b0c6be72425cd5e8f8369
-
SHA1
c94fa3368eb4946aad49c82a613d3cbe40266a60
-
SHA256
856d0a974a7e4eefc2d79baaf9ff34aacc6cf0f721804299fbff8d90c661e190
-
SHA512
8c65188147f98b7142cde942401cc2ff4cac58eb087e9f4830b62a8770a8a2606d4d2cd565c916c20dffdabfd3ede441d7c64cdafb45b38ee71b4f410f3a006b
-
SSDEEP
24576:eAHnh+eWsN3skA4RV1Hom2KXMmHasDoW7nuf5:Jh+ZkldoPK8YasEWK
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-