General
-
Target
a56436df8a2fedd2624c035ab834db76f6ee24d636a9a72d5fa4c04f7b0daa54.exe
-
Size
715KB
-
Sample
250312-dpqscsvr12
-
MD5
66ef84b6805972a29ec37b229201a9ca
-
SHA1
a0bd886bfd638ad32eaf0a024aa02249a06ee96f
-
SHA256
a56436df8a2fedd2624c035ab834db76f6ee24d636a9a72d5fa4c04f7b0daa54
-
SHA512
ecca6d0cc05d3fabb747a045ca3b6491db136ea1e3a6249b7324841ce118378001a6e6e3dc46ef57f2d7f8efc1f8392bd6fa49a9d08f76f352ed2c5997561834
-
SSDEEP
12288:2i6dsV0pMDI2RM5Sl96gUIfK/URUiPn98zC/2qvhHWUnHZW9dF/:cckemG96zIfmetn+hWBWU5WN/
Static task
static1
Behavioral task
behavioral1
Sample
a56436df8a2fedd2624c035ab834db76f6ee24d636a9a72d5fa4c04f7b0daa54.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
a56436df8a2fedd2624c035ab834db76f6ee24d636a9a72d5fa4c04f7b0daa54.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Los107.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Los107.ps1
Resource
win10v2004-20250217-en
Malware Config
Extracted
azorult
http://gd53.cfd/TL341/index.php
Targets
-
-
Target
a56436df8a2fedd2624c035ab834db76f6ee24d636a9a72d5fa4c04f7b0daa54.exe
-
Size
715KB
-
MD5
66ef84b6805972a29ec37b229201a9ca
-
SHA1
a0bd886bfd638ad32eaf0a024aa02249a06ee96f
-
SHA256
a56436df8a2fedd2624c035ab834db76f6ee24d636a9a72d5fa4c04f7b0daa54
-
SHA512
ecca6d0cc05d3fabb747a045ca3b6491db136ea1e3a6249b7324841ce118378001a6e6e3dc46ef57f2d7f8efc1f8392bd6fa49a9d08f76f352ed2c5997561834
-
SSDEEP
12288:2i6dsV0pMDI2RM5Sl96gUIfK/URUiPn98zC/2qvhHWUnHZW9dF/:cckemG96zIfmetn+hWBWU5WN/
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Blocklisted process makes network request
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Los107.Raj
-
Size
55KB
-
MD5
fd68605dede5dff48ac0498675704de0
-
SHA1
f1150379e8b26b01329c9af71dcaee0baf3ce819
-
SHA256
b4bcc505d66a46af9185af84e5472ef5045cf4abfe722207076d34fbf6df40d7
-
SHA512
36f1b2ed7cfe46141deef05cc236941363bd2ef54b3e627312f3f81d3217403a65ee4e1c94e6dce3edad99178e1263ab80f5d10b821bbf585ebdfd1b1400491f
-
SSDEEP
1536:XyhNN+u6AmjiFn3849RlX1Kdwfcdivcr8n:ihr4+nnlKTEUu
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-