General
-
Target
Dolby_Surround_for_crack_by_FUTURiTY.exe
-
Size
6.5MB
-
Sample
241231-1se7cs1mdt
-
MD5
a7046cf7b7f365ad5cbe1abe8424546d
-
SHA1
1dda689815b57ff34a48c4ec11138ed03fe384af
-
SHA256
a9c5e980225a4b1ecf8ca683dd59f1e5a9dee119964a0ef38481ecd1890f3dc9
-
SHA512
5763150bae74468465add87aba71b5f138f9dc99b16bbcb49e9fc8104c72b857c8dc083a2f97fce64141a91ae598c74c8ad265c8b2da441f4b3f64971e624d91
-
SSDEEP
196608:ehw16V6LxwNYQKnmFrG2V9BdioOJdVwIIP:LkOQrFrG2VXdSPVwIIP
Static task
static1
Behavioral task
behavioral1
Sample
Dolby_Surround_for_crack_by_FUTURiTY.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Dolby_Surround_for_crack_by_FUTURiTY.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
azorult
http://upqx.ru/1210776429.php
Targets
-
-
Target
Dolby_Surround_for_crack_by_FUTURiTY.exe
-
Size
6.5MB
-
MD5
a7046cf7b7f365ad5cbe1abe8424546d
-
SHA1
1dda689815b57ff34a48c4ec11138ed03fe384af
-
SHA256
a9c5e980225a4b1ecf8ca683dd59f1e5a9dee119964a0ef38481ecd1890f3dc9
-
SHA512
5763150bae74468465add87aba71b5f138f9dc99b16bbcb49e9fc8104c72b857c8dc083a2f97fce64141a91ae598c74c8ad265c8b2da441f4b3f64971e624d91
-
SSDEEP
196608:ehw16V6LxwNYQKnmFrG2V9BdioOJdVwIIP:LkOQrFrG2VXdSPVwIIP
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-