General
-
Target
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia
-
Size
331KB
-
Sample
250216-cx6ywaxqhx
-
MD5
5b692034c8d92d39d0dce48a26023190
-
SHA1
75476d84efa525812ad90774a00b8f02ae4c88d8
-
SHA256
3399fa00813d7df440adaedb1817cbbec28e303fdffc46191e6415ad20c78b94
-
SHA512
d58cf25b6729a6bbd31096e89b4dab2ff2c07da4d2da23e27268f1bf03e9a5ba184d39a96d2e157666d4c583a7c26f984d6f46a48b1b3cd010604aa5da6070b5
-
SSDEEP
6144:cu4PqtlK7KWQhbrsKaFnlHDqwRBbRCgf0BabAYviFsJyAFtHet:iPq/K7KWmrsKunhDfCsriqxve
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
azorult
http://jinf43ufm0edurygk49.bit/ak3nzor93jne93kwp/index.php
Targets
-
-
Target
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia
-
Size
331KB
-
MD5
5b692034c8d92d39d0dce48a26023190
-
SHA1
75476d84efa525812ad90774a00b8f02ae4c88d8
-
SHA256
3399fa00813d7df440adaedb1817cbbec28e303fdffc46191e6415ad20c78b94
-
SHA512
d58cf25b6729a6bbd31096e89b4dab2ff2c07da4d2da23e27268f1bf03e9a5ba184d39a96d2e157666d4c583a7c26f984d6f46a48b1b3cd010604aa5da6070b5
-
SSDEEP
6144:cu4PqtlK7KWQhbrsKaFnlHDqwRBbRCgf0BabAYviFsJyAFtHet:iPq/K7KWmrsKunhDfCsriqxve
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Downloads MZ/PE file
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-