General
-
Target
RNSM00385.7z
-
Size
35.1MB
-
Sample
241103-1zwspavlhz
-
MD5
2123f17113a72f395448ec9effbb1918
-
SHA1
4a356bf5ed0c303a84ef730be14f5a2e2216338e
-
SHA256
edf445524ed074987ec7007a6f0358bacef2e4db69ac7b7767097c2870535a4b
-
SHA512
e449603bfa86fc25038c4c7a3218bbdd376504c547d05d30d1568a2a238f8ed283cc22f5c8a23719a8f230695f05248b92e1b16a61812c1189e7345ff22a502f
-
SSDEEP
786432:g6MdZdIgDQt1MUc+g88bn+BOHccZyNtHbBwdxkqeIHup:FM/igC1Yr42cXN9yxkZIi
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00385.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
azorult
https://tenntechs.com/apps/index.php
Targets
-
-
Target
RNSM00385.7z
-
Size
35.1MB
-
MD5
2123f17113a72f395448ec9effbb1918
-
SHA1
4a356bf5ed0c303a84ef730be14f5a2e2216338e
-
SHA256
edf445524ed074987ec7007a6f0358bacef2e4db69ac7b7767097c2870535a4b
-
SHA512
e449603bfa86fc25038c4c7a3218bbdd376504c547d05d30d1568a2a238f8ed283cc22f5c8a23719a8f230695f05248b92e1b16a61812c1189e7345ff22a502f
-
SSDEEP
786432:g6MdZdIgDQt1MUc+g88bn+BOHccZyNtHbBwdxkqeIHup:FM/igC1Yr42cXN9yxkZIi
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Locky family
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1