General
-
Target
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
-
Size
7.2MB
-
Sample
241221-rdlads1len
-
MD5
fa920b6cffc985e71a9a7921b42ecb84
-
SHA1
24f4e6e3daa9d60cb249cda22d046ddd64056af1
-
SHA256
b8d1e274e76cd0e9ff78de57afe85f28b9d79620745c36dde51f5867039ce49f
-
SHA512
6b3be5bb452636bcc5516454aef23860e46f432e19caefa1093ed8bfe2a6fa6b68ea94edb7d405993b82a1eb82b1056dc6e6070a5fda728e9dcca0e9199ed0e1
-
SSDEEP
196608:GIeZHNhnaNOgD0rNWfu1LwGxLlrkoaAsHpS:GIeZHNhu0rggdxLZNuA
Static task
static1
Behavioral task
behavioral1
Sample
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
FILE_ID.diz
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Password.HERE.jpg
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
azorult
http://upqx.ru/1210776429.php
Targets
-
-
Target
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
-
Size
7.2MB
-
MD5
fa920b6cffc985e71a9a7921b42ecb84
-
SHA1
24f4e6e3daa9d60cb249cda22d046ddd64056af1
-
SHA256
b8d1e274e76cd0e9ff78de57afe85f28b9d79620745c36dde51f5867039ce49f
-
SHA512
6b3be5bb452636bcc5516454aef23860e46f432e19caefa1093ed8bfe2a6fa6b68ea94edb7d405993b82a1eb82b1056dc6e6070a5fda728e9dcca0e9199ed0e1
-
SSDEEP
196608:GIeZHNhnaNOgD0rNWfu1LwGxLlrkoaAsHpS:GIeZHNhu0rggdxLZNuA
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.zip
-
Size
7.2MB
-
MD5
d8921169fee349f9e70a294901d59ffb
-
SHA1
cf45c1d9b230ed7464596c24b8db099fe6cc9359
-
SHA256
af66ad74e9a3367191ad63919581995407706f28c45d8379f50da494ff724fd5
-
SHA512
b0c16d4b7b22361b70d94135a65d0284367791f3919237d2abd90688393f4378133baa4e88cafec3ebf9c467596019088b26931a971475e6c27ebee4742c63ec
-
SSDEEP
196608:FIeZHNhnaNOgD0rNWfu1LwGxLlrkoaAsHpS:FIeZHNhu0rggdxLZNug
Score1/10 -
-
-
Target
Cisco_VPN_Client_v5_0_07_keygen_by_KeyGenGuru.exe
-
Size
7.4MB
-
MD5
985a830153c1ffe009a634b0b041c919
-
SHA1
6761313463d3f3174ddfbe2dc32e4596bea44594
-
SHA256
2a12d2607a06e86780d8f8514c4dd122ad364f42a9fdde5378bd0da4708c3d3a
-
SHA512
5c07df35119ff549713e3648ed9fbbb798db226544b9a616589ad7f0ce7be213884f72ac2999fa246c514a44726d2e36995ed2fdf39c47dcfaa8e5de76251ff5
-
SSDEEP
196608:ehcoA1/WuwMmahoCsAlHhsoiLqu+dxytXom/GBuSPE1WKM:jo8VXhoCsArsoiyOXoT3
Score1/10 -
-
-
Target
FILE_ID.DIZ
-
Size
53B
-
MD5
d963dd9f9689dea88801545ae9f1dd44
-
SHA1
0d921c3a12c4673c0b4fae59fdca66524daa6a8c
-
SHA256
db0b438e2f1c1f0e84bf6b51ecf1e93bdd3315e123b3adafc7a4e9f8f3914525
-
SHA512
4c0008cae96d8f5662418127b0c34053a866050702e0a4983fa14e530f151ddd532c6a8476ecd8acd58ad6610ac096bdfe3b904e6d13e2ed76e0d808d4d5ffd1
Score3/10 -
-
-
Target
Password.HERE.jpeg
-
Size
2KB
-
MD5
b49a7202fb4a6cde0d9d8d4b933a7b76
-
SHA1
ac1f52da6f92d6588fb9813756a0190a7f167bd3
-
SHA256
ff5026d2e6a35f58170d6c0d12789682d800f29cf95e37da7e1af339a674924d
-
SHA512
6154c87492fdb5c61dd65caecf40ba56c509ff358c815e7de05608bdc1ea46ec5b049161edc1ada837e6f979883871b661aeb73459388330c61f89bf33da3f5c
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
7Credentials In Files
6Credentials in Registry
1