General
-
Target
RNSM00358.7z
-
Size
4.1MB
-
Sample
241107-z4x1wayjaw
-
MD5
a812ce484b08198b13bd5364fe53e0cd
-
SHA1
af007447c63e9dc6fa136d11f2c9547a2305a709
-
SHA256
5b66f1efd0f5f2bf6b272f8a26dc6530363c01bf8618aba5d7317b3974aebfd5
-
SHA512
47cd60d3da1d9b096574afd917cef86e335366687070091bab834fd0a7de7046c3e68575bd305f3c0364a9749e4f33066234bf9db44d50fd78eaf4579b748e1e
-
SSDEEP
98304:8fu9aU6RwxphyfueYC1zQufBy373WBrIm:8U96RahObBw3WKm
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00358.7z
Resource
win7-20240903-en
Malware Config
Extracted
C:\$Recycle.Bin\@[email protected]
1ARDXRQsvnsYiM5jZczFagtCrAzSFC1Qmy
Extracted
azorult
http://51.15.62.59/AED77D05-A028-477C-B013-04F33F1385C3/index.php
Extracted
F:\$RECYCLE.BIN\DKALBBRC-DECRYPT.txt
http://gandcrabmfe6mnef.onion/fba2a0c4a2d371a8
Extracted
azorult
http://admin.svapofit.com/azs/index.php
Extracted
formbook
3.9
ne
merkled.net
pearlspecial.com
1c1threeafter.men
bzshxx.com
cwgqn.info
sfhyh.com
flabstore.com
angelsdivine.com
kangshunda168.com
eatableza.com
myfitmee.com
flandersfieldstour.com
sljhmy.info
losangelescontemporary.com
yjlmk.net
qtuio.com
abetter2upgrade.win
eyup-arcelikservisi.com
xxxcon.info
stroy-staleks.com
sggwwpaw.com
theloelife.com
ubsintonline.com
m7jtlp66gg.com
ironmonkeyfilms.com
minilegend.com
dormero-dessau-rosslau.com
ivdwmx.info
theassignmenthelpers.com
rosemariealtberg.net
swiftlydeft.productions
silverrunoutfitting.com
jfgjwang.com
alphamedaesthetics.co.uk
designzclothing.com
ivanempire.win
doubleclick.group
studiomdesignsbymarcella.com
12pg.info
phonerobin.com
techcolor.store
plumbingbedfordshire.com
masozduygu.site
critical-faculty.com
ken-tour.net
vantaanapumiehet.com
bierdude.com
420taxes.com
alfha.info
arianpay.biz
microsofferrors.tech
dhf82.com
morght.com
sharpebeautyandwellnessspa.net
pensaryescribirenlibertad.info
manifest21s.com
waysourcing.com
gjirafavideostudios.net
pxqcf.info
crownrealestateinvestments.com
anwar-al3ashkin.net
language-tight.com
ikdtrading.com
omediapp.com
hacdop.com
Targets
-
-
Target
RNSM00358.7z
-
Size
4.1MB
-
MD5
a812ce484b08198b13bd5364fe53e0cd
-
SHA1
af007447c63e9dc6fa136d11f2c9547a2305a709
-
SHA256
5b66f1efd0f5f2bf6b272f8a26dc6530363c01bf8618aba5d7317b3974aebfd5
-
SHA512
47cd60d3da1d9b096574afd917cef86e335366687070091bab834fd0a7de7046c3e68575bd305f3c0364a9749e4f33066234bf9db44d50fd78eaf4579b748e1e
-
SSDEEP
98304:8fu9aU6RwxphyfueYC1zQufBy373WBrIm:8U96RahObBw3WKm
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Formbook family
-
Gandcrab family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Formbook payload
-
Renames multiple (2018) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
3Indicator Removal
1File Deletion
1Modify Registry
8Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1