MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03fcef266ae1dad0fd0441376ed2a2defd8621627681789c719b9d9cc4278cda. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 03fcef266ae1dad0fd0441376ed2a2defd8621627681789c719b9d9cc4278cda
SHA3-384 hash: 4fb9ef5ca4f0233c6a1a9965333c45d196996bc1c8198afbdd7b6909119a94fcd8f8325c90776c0f587e5e4867de578d
SHA1 hash: 64337ba362d73785e10a52a0a591a4a38e727930
MD5 hash: 2c6b6912c92602c1ae6dbdcfd061537c
humanhash: quiet-freddie-comet-hot
File name:SecuriteInfo.com.Win32.MalwareX-gen.29297.12331
Download: download sample
Signature AZORult
File size:1'495'040 bytes
First seen:2023-08-24 12:30:47 UTC
Last seen:2023-08-24 18:34:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b76bc86784ec95ebb411a5c6db5b65ea (1 x AZORult, 1 x RemcosRAT)
ssdeep 24576:SZPw5oynpM4NVNyB+MLWn9WUS20tFJTtf7BtdZhPKR6UW0YEq0UxX8OCo6Z0:SZPw+ynm+scWUktFJT5BtdZOWWqxxX8j
Threatray 15 similar samples on MalwareBazaar
TLSH T1A965D026E17781B3E25B3D32845A535B99147E202D3C950EA6A13ED8CF372D3F8252B7
TrID 86.8% (.EXE) Win32 Executable Borland Delphi 6 (262638/61)
4.6% (.EXE) Win32 Executable Delphi generic (14182/79/4)
4.3% (.SCR) Windows screen saver (13097/50/3)
1.4% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon 819cf0d2d4c2d400 (1 x AZORult, 1 x RemcosRAT)
Reporter SecuriteInfoCom
Tags:AZORult exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
321
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.MalwareX-gen.29297.12331
Verdict:
Malicious activity
Analysis date:
2023-08-24 12:31:43 UTC
Tags:
dbatloader loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
DNS request
Sending an HTTP GET request
Launching a process
Sending an HTTP POST request
Creating a file in the %temp% subdirectories
Creating a file
Reading critical registry keys
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult, DBatLoader
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
DLL side loading technique detected
Early bird code injection technique detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queues an APC in another process (thread injection)
Snort IDS alert for network traffic
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected DBatLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1296662 Sample: SecuriteInfo.com.Win32.Malw... Startdate: 24/08/2023 Architecture: WINDOWS Score: 100 35 Snort IDS alert for network traffic 2->35 37 Found malware configuration 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 7 other signatures 2->41 8 SecuriteInfo.com.Win32.MalwareX-gen.29297.12331.exe 2->8         started        process3 dnsIp4 31 econorthbrasil.com.br 187.1.137.111, 49705, 80 IPV6InternetLtdaBR Brazil 8->31 43 Early bird code injection technique detected 8->43 45 Allocates memory in foreign processes 8->45 47 Queues an APC in another process (thread injection) 8->47 12 SndVol.exe 64 8->12         started        signatures5 process6 dnsIp7 33 br3dq.shop 188.114.96.7, 49706, 49712, 80 CLOUDFLARENETUS European Union 12->33 23 C:\Users\user\AppData\Local\Temp\...\nss3.dll, PE32 12->23 dropped 25 C:\Users\user\AppData\Local\...\mozglue.dll, PE32 12->25 dropped 27 C:\Users\user\AppData\...\vcruntime140.dll, PE32 12->27 dropped 29 45 other files (none is malicious) 12->29 dropped 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->49 51 Tries to steal Instant Messenger accounts or passwords 12->51 53 Tries to steal Mail credentials (via file / registry access) 12->53 55 6 other signatures 12->55 17 cmd.exe 1 12->17         started        file8 signatures9 process10 process11 19 conhost.exe 17->19         started        21 timeout.exe 1 17->21         started       
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2023-08-24 10:37:54 UTC
File Type:
PE (Exe)
Extracted files:
60
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:azorult family:modiloader infostealer spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Reads local data of messenger clients
ModiLoader Second Stage
Azorult
ModiLoader, DBatLoader
Unpacked files
SH256 hash:
7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
MD5 hash:
c116d3604ceafe7057d77ff27552c215
SHA1 hash:
452b14432fb5758b46f2897aeccd89f7c82a727d
SH256 hash:
03fcef266ae1dad0fd0441376ed2a2defd8621627681789c719b9d9cc4278cda
MD5 hash:
2c6b6912c92602c1ae6dbdcfd061537c
SHA1 hash:
64337ba362d73785e10a52a0a591a4a38e727930
Detections:
DbatLoaderStage1
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BobSoftMiniDelphiBoBBobSoft
Author:malware-lu
Rule name:Borland
Author:malware-lu
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments