General
-
Target
722ef401e5cbb067c5c33faa402774d3c75ef08e0c8cc4d7e66a9cfa53684088.zip
-
Size
440KB
-
Sample
250103-zyc4hswmdl
-
MD5
58e061a3e81cb785f52ab4d8994332a3
-
SHA1
ffa3cbb4f30ed7cf8b479c35259f7862777862dd
-
SHA256
56ca60531174026042a626e1468fe4707f4c172f6791858ab0f049105f50ae10
-
SHA512
eae53105b4f4cdf8e05a3f941f8b1817157b5c3cf062244a7524462bc6296298d0efaf02f5ec2e44a1a200b02b56616ddb5a5d64f93aa54ae8f0536b33c60a1f
-
SSDEEP
12288:Nu1KPDVJz+83nzMPlE5NCzXbZgHKk7gN9OclWI:1PPz+V9kNCfmHKkg/P
Static task
static1
Behavioral task
behavioral1
Sample
722ef401e5cbb067c5c33faa402774d3c75ef08e0c8cc4d7e66a9cfa53684088.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
722ef401e5cbb067c5c33faa402774d3c75ef08e0c8cc4d7e66a9cfa53684088.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
azorult
http://5gw4d.xyz/PL341/index.php
Targets
-
-
Target
722ef401e5cbb067c5c33faa402774d3c75ef08e0c8cc4d7e66a9cfa53684088.exe
-
Size
483KB
-
MD5
7a0093c743fc33a5e111f2fec269f79b
-
SHA1
feadb2ca02d41f2d834b8577f39a582d4bdd734f
-
SHA256
722ef401e5cbb067c5c33faa402774d3c75ef08e0c8cc4d7e66a9cfa53684088
-
SHA512
77cade5a9e48f8d1da6e689a7881b23a1be165f1be8f26059458766e6fc4db8c03c058beb19dd0f644aebd218371ef487fe31a086e6fbc7089976d0802010eee
-
SSDEEP
12288:9ydPkF/ZAC8I1SkXHmjQ961/Tl9/EHDO2wb:U+F/ZA/8SkXx61LIHDO
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-