General
-
Target
9b9fd5ad54ba1aadc670fa4be3edab4ba8abca1b49880f57d4378320129c2f41
-
Size
367KB
-
Sample
241002-m8g41awhqd
-
MD5
151925b02c36a765ffce463bde609709
-
SHA1
2aeae165447f5ddde94c6eb0f988fd46bfff918e
-
SHA256
9b9fd5ad54ba1aadc670fa4be3edab4ba8abca1b49880f57d4378320129c2f41
-
SHA512
ae7dbbdae55e3653054d10a0f2c96b99ce48cfccae667f79ced5cdeb35ba5cecd3d674cbe1a9f1938a6e59c29f3897e0a8dd3134d078c34a7e2c8d4530161351
-
SSDEEP
6144:mfAUPJqkXfWFLYUOHtbN8SykPDokpI75GyHfNS3f1AWPjxmDvTBCZhobpaaCqqL3:mTRXeFLxGR2ki7gQfUf1AWLxmDvTeKs5
Static task
static1
Behavioral task
behavioral1
Sample
PO for October.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PO for October.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
azorult
http://chr1zx.shop/ME341/index.php
Targets
-
-
Target
PO for October.exe
-
Size
505KB
-
MD5
bf850cd7bd7cdfc2b21420ae5911fbaf
-
SHA1
9b67f9d3e9319f9abd19686411884c441051e568
-
SHA256
9576f740ace3c18ef6ab226e8c6ec41597af4d6b96ee8bc50861420cd7385193
-
SHA512
02862973206b7a5c25d63a6b4f4f558a242ae8b7cbe698f1208d2cd2b048d1bd843b32b7b1823607134271e4d34128b04a114a80b481be2783af888dab7ae0fb
-
SSDEEP
12288:ehSF4nneptwUHCQ9BelL91hiV0kqLFk0hyS2BjXGRKki7kQfwf1mWZxmDBVMayaE:ehvgdES41Lx4BSBnHt
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
dd87a973e01c5d9f8e0fcc81a0af7c7a
-
SHA1
c9206ced48d1e5bc648b1d0f54cccc18bf643a14
-
SHA256
7fb0f8d452fefaac789986b933df050f3d3e4feb8a8d9944ada995f572dcdca1
-
SHA512
4910b39b1a99622ac8b3c42f173bbe7035ac2f8d40c946468e7db7e2868a2da81ea94da453857f06f39957dd690c7f1ba498936a7aaa0039975e472376f92e8f
-
SSDEEP
192:VFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/993:97pJp48F2exrg5F/9
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
7Credentials In Files
6Credentials in Registry
1