Overview
overview
10Static
static
10stage1-macro.xls
windows7-x64
3stage1-macro.xls
windows10-2004-x64
1stage5-azorult.exe
windows7-x64
10stage5-azorult.exe
windows10-2004-x64
10stage5-loa...ed.dll
windows7-x64
1stage5-loa...ed.dll
windows10-2004-x64
1stage5-loa...ll.ps1
windows7-x64
3stage5-loa...ll.ps1
windows10-2004-x64
3stage5-loader.dll
windows7-x64
1stage5-loader.dll
windows10-2004-x64
1Behavioral task
behavioral1
Sample
stage1-macro.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
stage1-macro.xls
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
stage5-azorult.exe
Resource
win7-20250207-en
Behavioral task
behavioral4
Sample
stage5-azorult.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
stage5-loader-cleaned.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
stage5-loader-cleaned.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
stage5-loader-powershell.ps1
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
stage5-loader-powershell.ps1
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
stage5-loader.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
stage5-loader.dll
Resource
win10v2004-20250314-en
Errors
General
-
Target
94ed2192d082b1fadb6885f35e132957b28d6c7b3ec045c7599bf4eb611145c5.zip
-
Size
323KB
-
MD5
c4dd8d54f12622b0f986bf41a6aae4ce
-
SHA1
1858b25b813a53ef4c635b80081728995f010b2a
-
SHA256
94ed2192d082b1fadb6885f35e132957b28d6c7b3ec045c7599bf4eb611145c5
-
SHA512
b30aa06711e8e1e0bda0d4327a5e91be5fec98b62cd79a704d2834534ee299540278d43a9aa24f3b45d59564a1885a8624495e8f60940ca03f0be5e3070cf091
-
SSDEEP
6144:M8nxEpH612TdovIhaS7Ja66qXXVcpbqIQIaoabLlij3FA9hQdES0F8:MQE5P6vIYE9XXLb2FrEP8
Malware Config
Signatures
-
Azorult family
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack002/stage1-macro.xls office_macro_on_action -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack002/stage4.ex_ unpack002/stage5-azorult.dll unpack002/stage5-loader-cleaned.dll unpack002/stage5-loader.dll
Files
-
94ed2192d082b1fadb6885f35e132957b28d6c7b3ec045c7599bf4eb611145c5.zip.zip
Password: infected
-
5b4314edaf2c1bc2e8edb57d84d9249ec97980bbf2d345859f66351d40995305.zip.zip
-
stage1-macro.xls.xls windows office2003
-
stage2-decoded-vbs-cleaned.txt.html .vbs polyglot
-
stage2-decoded-vbs.txt.html .vbs polyglot
-
stage2-encoded-js.txt.html .js polyglot
-
stage3-decoded-vbs.txt.html .ps1 polyglot
-
stage3-encoded-js.txt.html .js polyglot
-
stage4.ex_.exe .vbs windows:4 windows x86 arch:x86 polyglot
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
stage4.txt
-
stage5-azorult-blob.txt
-
stage5-azorult.dll.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 2KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
stage5-loader-base64.txt
-
stage5-loader-cleaned.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
stage5-loader-powershell.txt.ps1
-
stage5-loader.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ