Overview
overview
10Static
static
109fc216bcf1...65.exe
windows7-x64
109fc216bcf1...65.exe
windows10-2004-x64
109fc216bcf1...65.exe
android-11-x64
9fc216bcf1...65.exe
android-13-x64
9fc216bcf1...65.exe
macos-10.15-amd64
9fc216bcf1...65.exe
ubuntu-18.04-amd64
9fc216bcf1...65.exe
debian-9-armhf
9fc216bcf1...65.exe
debian-9-mips
9fc216bcf1...65.exe
debian-9-mipsel
General
-
Target
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265
-
Size
2.0MB
-
Sample
250124-gb57nssncy
-
MD5
297cd7862888ad0e1825f306766b02b5
-
SHA1
253a4ba52cbffc47934c7ee013645b6df70d1f61
-
SHA256
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265
-
SHA512
d1a50e30cfdbfc58183436a500f7c910a2f52cad0d864f1c356d299f28b0d66c42b5f55815f915e3499db2fcdd596f9183dd4262fd421f61344e92d12d9720cd
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY+:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y0
Behavioral task
behavioral1
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
macos-20241101-en
Behavioral task
behavioral6
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral8
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral9
Sample
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265.exe
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Extracted
azorult
http://0x21.in:8000/_az/
Targets
-
-
Target
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265
-
Size
2.0MB
-
MD5
297cd7862888ad0e1825f306766b02b5
-
SHA1
253a4ba52cbffc47934c7ee013645b6df70d1f61
-
SHA256
9fc216bcf16e8f0145abba39e08b2c9985a2a8c4345ea7bb5cdc381913e58265
-
SHA512
d1a50e30cfdbfc58183436a500f7c910a2f52cad0d864f1c356d299f28b0d66c42b5f55815f915e3499db2fcdd596f9183dd4262fd421f61344e92d12d9720cd
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY+:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y0
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-