MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1aa02b7eecf8748545bb286cf171f4adae70a7a0aa6fdd97a38874afa5187bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c1aa02b7eecf8748545bb286cf171f4adae70a7a0aa6fdd97a38874afa5187bc
SHA3-384 hash: 52495572c67d16a562c1077b2c882f8da0219371598e6628dba7c37b5b2f0f2e4d245de695d5f544e1dbeb6fa862abb0
SHA1 hash: 4bfee30b5714e23c77702bdfbebd909682dc07c8
MD5 hash: eb2ad26d4ef8137fe9f2568d5e1874d7
humanhash: december-queen-sierra-carbon
File name:ff.exe
Download: download sample
Signature AZORult
File size:608'768 bytes
First seen:2020-05-28 11:36:20 UTC
Last seen:2020-05-28 12:58:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6d288dc5caa33b7016aaba80a9d6ba09 (4 x AgentTesla, 1 x FormBook, 1 x NetWire)
ssdeep 12288:qEXTxRvHr3x2NRWc9Wt8PjIOrtkroeUp6He73uGBYrdXXu88aFKk94hh5Phi4gHM:/j7Hr3xcRWonPjIOrtkroeUp6He73uGX
Threatray 433 similar samples on MalwareBazaar
TLSH CDD48D62F2905C33C153157E9D3BA77C982EBE51392826723BF5DC4C9F29381392B296
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
Malspam distributing AZORult:

HELO: mail.strongmailvault.com
Sending IP: 111.90.144.220
From: info@yosungroup.ga
Subject: RE: QUATATION
Attachment: Quatation023.rar (contains "ff.exe")

AZORult C2:
http://truva2007.com.tr/wp/wp/index.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-28 12:36:53 UTC
File Type:
PE (Exe)
Extracted files:
227
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult discovery infostealer trojan
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Azorult
Malware Config
C2 Extraction:
http://truva2007.com.tr/wp/wp/index.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AZORult

Executable exe c1aa02b7eecf8748545bb286cf171f4adae70a7a0aa6fdd97a38874afa5187bc

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments