MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0331c7bca665f36513377fc301cbb32822ff35f92511579d699613f0bb624802. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 4 File information Comments

SHA256 hash: 0331c7bca665f36513377fc301cbb32822ff35f92511579d699613f0bb624802
SHA3-384 hash: 9084e9a333cf78e5dd3dcb4bc2d4c18320e080d4d9120f96ddb9073983325107be3f75a470affd8db557e0ea363d9b0c
SHA1 hash: d10607746d8d0a25b1f4c5de6e4117ccd8d43897
MD5 hash: 56db11a012b50b84e5c527f3d9d9cd89
humanhash: burger-sixteen-violet-mobile
File name:0331C7BCA665F36513377FC301CBB32822FF35F925115.exe
Download: download sample
Signature AZORult
File size:7'666'176 bytes
First seen:2021-11-23 23:41:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 712f4a29c405ecb576101d367b2180fb (14 x Smoke Loader, 2 x AZORult, 1 x Formbook)
ssdeep 196608:DYjLO64m7a5lii3/vxlC7LmaNzsZbfi4r0OK1TndtMD2c0BK+HtD:OS64IaTicvxlC7bNg1nQR56D2c
TLSH T1297633C729599C61CC7B337478A46C3314DA2630FAD8312D9143EE98E24B687AC7E779
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://finlzzm.com/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://finlzzm.com/index.php https://threatfox.abuse.ch/ioc/173392/

Intelligence


File Origin
# of uploads :
1
# of downloads :
399
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0331C7BCA665F36513377FC301CBB32822FF35F925115.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-23 23:44:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% directory
Сreating synchronization primitives
DNS request
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Sending a custom TCP request
Searching for synchronization primitives
Searching for the window
Sending an HTTP GET request
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file
Modifying a system file
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
emotet gandcrab packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
DelphiStealer
Verdict:
Malicious
Result
Threat name:
AZORult
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Creates multiple autostart registry keys
Detected AZORult Info Stealer
Detected unpacking (changes PE section rights)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive service information (via WMI, MSSMBios_RawSMBiosTables, often done to detect sandboxes)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 527579 Sample: 0331C7BCA665F36513377FC301C... Startdate: 24/11/2021 Architecture: WINDOWS Score: 100 90 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->90 92 Malicious sample detected (through community Yara rule) 2->92 94 Antivirus / Scanner detection for submitted sample 2->94 96 6 other signatures 2->96 8 0331C7BCA665F36513377FC301CBB32822FF35F925115.exe 1 3 2->8         started        13 ChameleonFolder.exe 2 31 2->13         started        15 ChameleonExplorer.exe 2->15         started        17 6 other processes 2->17 process3 dnsIp4 82 2no.co 5.9.164.117, 443, 49743 HETZNER-ASDE Germany 8->82 54 C:\Users\user\AppData\Roaming\update.exe, PE32 8->54 dropped 56 C:\Users\user\AppData\Roaming\cexplorer.exe, PE32 8->56 dropped 108 Injects code into the Windows Explorer (explorer.exe) 8->108 19 cexplorer.exe 2 8->19         started        23 update.exe 12 8->23         started        58 C:\...xplorerHelper64.dll_backup, PE32+ 13->58 dropped 60 C:\...xplorerHelper64.dll, PE32+ 13->60 dropped 62 C:\...xplorerHelper32.dll_backup, PE32 13->62 dropped 64 C:\...xplorerHelper32.dll, PE32 13->64 dropped 110 Creates multiple autostart registry keys 13->110 26 ChameleonFolder64.exe 13->26         started        84 www.chameleon-managers.com 15->84 86 ghs.googlehosted.com 15->86 28 ChameleonFolder.exe 15->28         started        file5 signatures6 process7 dnsIp8 44 C:\Users\user\AppData\Local\...\cexplorer.tmp, PE32 19->44 dropped 98 Obfuscated command line found 19->98 30 cexplorer.tmp 33 26 19->30         started        74 finlzzm.com 35.205.61.67, 49744, 49745, 80 GOOGLEUS United States 23->74 100 Antivirus detection for dropped file 23->100 102 Detected unpacking (changes PE section rights) 23->102 104 Detected AZORult Info Stealer 23->104 106 Machine Learning detection for dropped file 23->106 file9 signatures10 process11 file12 66 C:\...\ChameleonFolder.exe (copy), PE32 30->66 dropped 68 C:\...\ChameleonExplorer.exe (copy), PE32+ 30->68 dropped 70 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 30->70 dropped 72 14 other files (none is malicious) 30->72 dropped 33 ChameleonExplorer.exe 53 30->33         started        36 ChameleonFolder.exe 1 13 30->36         started        39 ChameleonExplorer.exe 9 6 30->39         started        42 ChameleonExplorer.exe 30->42         started        process13 dnsIp14 88 Creates multiple autostart registry keys 33->88 46 C:\...\Folder64.dll_backup, PE32+ 36->46 dropped 48 C:\Program Files (x86)\...\Folder64.dll, PE32+ 36->48 dropped 50 C:\Program Files (x86)\...\Folder.dll_backup, PE32 36->50 dropped 52 C:\Program Files (x86)\...\Folder.dll, PE32 36->52 dropped 76 ghs.googlehosted.com 142.250.203.115, 49746, 49751, 80 GOOGLEUS United States 39->76 78 neosoft-activator.appspot.com 172.217.168.52, 443, 49747 GOOGLEUS United States 39->78 80 www.chameleon-managers.com 39->80 file15 signatures16
Threat name:
Win32.Infostealer.Coins
Status:
Malicious
First seen:
2018-10-21 23:34:16 UTC
File Type:
PE (Exe)
Extracted files:
64
AV detection:
24 of 44 (54.55%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
azorult
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult discovery evasion infostealer persistence trojan upx
Behaviour
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in System32 directory
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Loads dropped DLL
Executes dropped EXE
Azorult
Registers COM server for autorun
Unpacked files
SH256 hash:
259a438468221a0e4e9ed2f09378679f45a981347b3fcd7a039bc588421651cc
MD5 hash:
acfc57c7353a98941ecee8a7ec684160
SHA1 hash:
db126f53b26fb258803d8fb4a2c2ec09d7cbb50f
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
deefda40ee4ec84eff366c2829259edd814417cdb50f7ba742f6b01f684ad2ca
MD5 hash:
876936cc892afb38d52ffe6f89879b74
SHA1 hash:
b42204c3f96a149ac302121c88d7cb90011bdc24
SH256 hash:
983184026bbe689d9f1591a237e7444f04b6f7f5544c36a525e2a2edbc453159
MD5 hash:
1286df675c3878d0fc4a89fccd98ce86
SHA1 hash:
1539c28a93201379fbb80f77251fec4ea8d7dfde
SH256 hash:
f3d99d48575a9ed406020c3a24024a173762fb31f6d72906a297a32f14cb6583
MD5 hash:
84c4cbef386c3e1abc5b04bb31a5e746
SHA1 hash:
12077f5f490186d2f614e317c2757bd8aae23d3e
SH256 hash:
e811ed56d799aad172811f8446b3af6829875c88f54d39a5cf81ef4469fc08a8
MD5 hash:
48a9a4d8b4d31f0b28675f2a205a9895
SHA1 hash:
acba2db35357a4c9a99395c3a9288e6d11d2aee5
SH256 hash:
54d9265c32b2780e847591a1ea2c7b822a3fac23de628f282f76de18a8d26b34
MD5 hash:
36fbab6baeab5c64f106ad21b1d065a0
SHA1 hash:
10a784b0271e7f45acb098cf7bfe21aa78e02174
SH256 hash:
0331c7bca665f36513377fc301cbb32822ff35f92511579d699613f0bb624802
MD5 hash:
56db11a012b50b84e5c527f3d9d9cd89
SHA1 hash:
d10607746d8d0a25b1f4c5de6e4117ccd8d43897
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE).
Rule name:Azorult
Author:kevoreilly
Description:Azorult Payload
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:win_azorult_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.azorult.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments