Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2025 02:28
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe
Resource
win10v2004-20250211-en
General
-
Target
2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe
-
Size
331KB
-
MD5
5b692034c8d92d39d0dce48a26023190
-
SHA1
75476d84efa525812ad90774a00b8f02ae4c88d8
-
SHA256
3399fa00813d7df440adaedb1817cbbec28e303fdffc46191e6415ad20c78b94
-
SHA512
d58cf25b6729a6bbd31096e89b4dab2ff2c07da4d2da23e27268f1bf03e9a5ba184d39a96d2e157666d4c583a7c26f984d6f46a48b1b3cd010604aa5da6070b5
-
SSDEEP
6144:cu4PqtlK7KWQhbrsKaFnlHDqwRBbRCgf0BabAYviFsJyAFtHet:iPq/K7KWmrsKunhDfCsriqxve
Malware Config
Extracted
azorult
http://jinf43ufm0edurygk49.bit/ak3nzor93jne93kwp/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Downloads MZ/PE file 2 IoCs
flow pid Process 53 4988 Process not Found 26 4560 Process not Found -
Unexpected DNS network traffic destination 16 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 85 162.248.241.94 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 87 172.98.193.42 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 43 173.212.234.232 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 50 173.249.7.187 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 57 46.101.70.183 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 63 5.45.97.127 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 68 82.141.39.32 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 23 91.217.137.44 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 30 80.233.248.109 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 66 50.3.82.215 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 6 151.80.147.153 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 32 130.255.78.223 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 74 107.172.42.186 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 82 128.52.130.209 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 89 192.52.166.110 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Destination IP 73 94.247.43.254 928 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2184 MicrosoftEdgeUpdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-16_5b692034c8d92d39d0dce48a26023190_mafia.exe"1⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:928
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QzUxMzJDQkMtOUY1OC00QzVGLTk5ODctQ0Y3N0E1ODU3REQzfSIgdXNlcmlkPSJ7RUJFMEUyMTgtQzBDQS00RTI1LUE2ODAtNDM2ODA5RTM2MkQ0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NDg2RjNBNzgtQzAyNS00QzU5LThFOTYtNDc5RkUyMjgwNERBfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0ODM0MDkyODE0Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2184