General
-
Target
5df170c2724edfdf5f666dd351a9ed2684fcba0214ec0daabf865f8132183f2b
-
Size
2.3MB
-
Sample
241130-2zzd9aspar
-
MD5
94106a45d35392cc8841f43dd1057dad
-
SHA1
9abcff1a71e65615c13dda256c7fd3bd0e415810
-
SHA256
5df170c2724edfdf5f666dd351a9ed2684fcba0214ec0daabf865f8132183f2b
-
SHA512
084a3b99a20e0c007cead9c5ebe18552877b0f48e0bf1ab283e49519e243255811ad80125f657615419c704f7dc8ae5ec708e8db970920411f9f69e1c9149a97
-
SSDEEP
49152:knHRdapxi3WZfvPN/zeYr9kllOyKGw3A0YnY1+yenmkMCunRHq:cHRda+avPgAOOytw3A0L1emkMCMlq
Static task
static1
Behavioral task
behavioral1
Sample
5df170c2724edfdf5f666dd351a9ed2684fcba0214ec0daabf865f8132183f2b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5df170c2724edfdf5f666dd351a9ed2684fcba0214ec0daabf865f8132183f2b.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5df170c2724edfdf5f666dd351a9ed2684fcba0214ec0daabf865f8132183f2b
-
Size
2.3MB
-
MD5
94106a45d35392cc8841f43dd1057dad
-
SHA1
9abcff1a71e65615c13dda256c7fd3bd0e415810
-
SHA256
5df170c2724edfdf5f666dd351a9ed2684fcba0214ec0daabf865f8132183f2b
-
SHA512
084a3b99a20e0c007cead9c5ebe18552877b0f48e0bf1ab283e49519e243255811ad80125f657615419c704f7dc8ae5ec708e8db970920411f9f69e1c9149a97
-
SSDEEP
49152:knHRdapxi3WZfvPN/zeYr9kllOyKGw3A0YnY1+yenmkMCunRHq:cHRda+avPgAOOytw3A0L1emkMCMlq
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-