General
-
Target
RNSM00331.7z
-
Size
829KB
-
Sample
241111-1p1c5axejq
-
MD5
7b31fb85873a3c577a52b0b57ba94432
-
SHA1
c476494ddfa833612be0a4d6a8492bba08380994
-
SHA256
1d5dce56b1bf8f92c234163db2d3338db08aa0a94acdbd6a9ec131ba1531b6ca
-
SHA512
be6b0cb9fb54b536e246e9e944f1f5b988936de73abec380f2f14527b3c9abadbb6df3e8c96d1255e66af16494c0464179adc2699d092fcd297c31c581eb1ea3
-
SSDEEP
24576:Qo2pvlAY6jcuObIc1SN2UiI+Ud5+DS9l8ROn:mpvlsYIcYN2FnUdQS9qROn
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00331.7z
Resource
win7-20240903-en
Malware Config
Extracted
azorult
http://admin.svapofit.com/azs/index.php
http://plagueonline.com/index.php
Targets
-
-
Target
RNSM00331.7z
-
Size
829KB
-
MD5
7b31fb85873a3c577a52b0b57ba94432
-
SHA1
c476494ddfa833612be0a4d6a8492bba08380994
-
SHA256
1d5dce56b1bf8f92c234163db2d3338db08aa0a94acdbd6a9ec131ba1531b6ca
-
SHA512
be6b0cb9fb54b536e246e9e944f1f5b988936de73abec380f2f14527b3c9abadbb6df3e8c96d1255e66af16494c0464179adc2699d092fcd297c31c581eb1ea3
-
SSDEEP
24576:Qo2pvlAY6jcuObIc1SN2UiI+Ud5+DS9l8ROn:mpvlsYIcYN2FnUdQS9qROn
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Emotet family
-
Modifies WinLogon for persistence
-
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-