Resubmissions

13-01-2025 18:16

250113-wwl2vsslcs 10

19-02-2022 23:05

220219-22vh3secc6 10

Analysis

  • max time kernel
    96s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 18:16

General

  • Target

    35822803c27dd735237152783a1296bd58d3011c07697b236a4df56eacd078e9.exe

  • Size

    112KB

  • MD5

    49df49a67ef570fd96227875b5741e93

  • SHA1

    0b7c33eaabc8cfead956f1388d7ed70bd7aad07c

  • SHA256

    35822803c27dd735237152783a1296bd58d3011c07697b236a4df56eacd078e9

  • SHA512

    b0ead317280c35ddd867412ddbfcf53706d85a0546beef612401005378cb34444a43f8cf881f28cf77a8314b8709cf0bd86afbdcdec3dbb65423963e5f39cda3

  • SSDEEP

    3072:KExRaQ6raoCoCyz6/mqv1JR+yBtGOeaeWgifq:faO1tme++wii

Malware Config

Extracted

Family

azorult

C2

http://128.199.113.162/panel/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Azorult family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\35822803c27dd735237152783a1296bd58d3011c07697b236a4df56eacd078e9.exe
    "C:\Users\Admin\AppData\Local\Temp\35822803c27dd735237152783a1296bd58d3011c07697b236a4df56eacd078e9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3520-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB