General
-
Target
RNSM00330.7z
-
Size
910KB
-
Sample
241111-1q8e5axelq
-
MD5
54b42e36ccf7b09f89b13b612c6a22a8
-
SHA1
82440a7b7934cb920bb9f0f441d1b5057829d0b5
-
SHA256
a91099e533b47793b3fcbbb538211b859d1c068acd0d0bc37a16a01da4905f26
-
SHA512
b35e0ab40ab4c3a986e43fadb2bc74f504269a3a920c9cab49dc593663e81595b15b27a50239ce42140a36c14b8da52fe22115324e5fefd08fc01867db158794
-
SSDEEP
24576:IyJb2v9yNL7H8D/X0mALHr0+qfUyJN1EQJoFdJjSbZF:IyJOCfc50rzqVNRedJ6F
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00330.7z
Resource
win7-20241023-en
Malware Config
Extracted
azorult
http://admin.svapofit.com/azs/index.php
Targets
-
-
Target
RNSM00330.7z
-
Size
910KB
-
MD5
54b42e36ccf7b09f89b13b612c6a22a8
-
SHA1
82440a7b7934cb920bb9f0f441d1b5057829d0b5
-
SHA256
a91099e533b47793b3fcbbb538211b859d1c068acd0d0bc37a16a01da4905f26
-
SHA512
b35e0ab40ab4c3a986e43fadb2bc74f504269a3a920c9cab49dc593663e81595b15b27a50239ce42140a36c14b8da52fe22115324e5fefd08fc01867db158794
-
SSDEEP
24576:IyJb2v9yNL7H8D/X0mALHr0+qfUyJN1EQJoFdJjSbZF:IyJOCfc50rzqVNRedJ6F
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Renames multiple (174) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1