Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 20:35
Static task
static1
Behavioral task
behavioral1
Sample
1748a5e01c75f57058effdc97a867f1f15019badf0278a1d27315b089046f5c9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1748a5e01c75f57058effdc97a867f1f15019badf0278a1d27315b089046f5c9.exe
Resource
win10v2004-20241007-en
General
-
Target
1748a5e01c75f57058effdc97a867f1f15019badf0278a1d27315b089046f5c9.exe
-
Size
174KB
-
MD5
cefdfa79727289cd880a451a20fe6a0f
-
SHA1
210041075f7109679231642a39170e8e1b331f7d
-
SHA256
1748a5e01c75f57058effdc97a867f1f15019badf0278a1d27315b089046f5c9
-
SHA512
d32afe7946871521f39946a66143c4c29018f86862af552fdcb5d75b745502fdc8a180368b9797f95a2b4a662ad7cd9056a301be7d2c985ebedd6a51c27829ef
-
SSDEEP
3072:Zv4xO140Ca+nOHE0N4LDvVZ5FmXA/78mMBbIVWtuaJxHPQGVXBNBOX3HN:ZgxO1jEw4LDvVZHmXNaVWzXvQG7y
Malware Config
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1748a5e01c75f57058effdc97a867f1f15019badf0278a1d27315b089046f5c9.exe