Behavioral task
behavioral1
Sample
3208-22-0x0000000000450000-0x00000000016A4000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3208-22-0x0000000000450000-0x00000000016A4000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3208-22-0x0000000000450000-0x00000000016A4000-memory.dmp
-
Size
18.3MB
-
MD5
a7299ca1c00e36fe5b59f27733114e4d
-
SHA1
1362da04b0d10fd49dc46e9029f013cfaed91ebd
-
SHA256
3d67c0d1e4c75a92693b640144e34ca8aae46615c76bfcf9f6dbd6a992f8a838
-
SHA512
ddd94c294b357b64c5cdd673d24c9cca685c1b08be6ca02d3b9b97307f31142c0d8256e8f00b8fc39c854fb2b7f1bef4ef6f8ca8e947411a6335d155b0cc8a12
-
SSDEEP
3072:KPe4b7aVpWsN/62ValtTjWyBNuvT4gG3VMCvq:pvh/VQW4VVMCS
Malware Config
Extracted
azorult
http://e3z1.shop/HT341/index.php
Signatures
-
Azorult family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3208-22-0x0000000000450000-0x00000000016A4000-memory.dmp
Files
-
3208-22-0x0000000000450000-0x00000000016A4000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ