MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 13979361d20b6c7184a7d3a8e5454782162a4ab734d2f9a01ed8421aeea5eee9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 4 File information Comments

SHA256 hash: 13979361d20b6c7184a7d3a8e5454782162a4ab734d2f9a01ed8421aeea5eee9
SHA3-384 hash: 8298c83e9e0c7cf9df01c19b6e4acf6469da632c33509faa2d668cbf9d3335c6209ab5b7868493af3307ff24c00b90d4
SHA1 hash: 3a00a1b5748b4bc617dbb1343379e8ad6913696d
MD5 hash: e94f95f1e37393658a2f5d2d92bfb982
humanhash: potato-eleven-low-spring
File name:13979361D20B6C7184A7D3A8E5454782162A4AB734D2F.exe
Download: download sample
Signature AZORult
File size:13'710'001 bytes
First seen:2021-07-13 11:17:12 UTC
Last seen:2021-07-13 11:37:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2fb819a19fe4dee5c03e8c6a79342f79 (56 x Adware.InstallCore, 8 x RedLineStealer, 7 x Adware.ExtenBro)
ssdeep 393216:hdnYAQ87s3DRP+phFy2W9lkrfhteYzHSTit:TnYOK+phe8rhteY7STit
Threatray 842 similar samples on MalwareBazaar
TLSH T19AD611528ED10678D96E807E196C44F826BB28C57B755107EF772D0E3A2ECECBA3418D
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://51.15.231.96/4/3AFDF4A3-33B5-4028-B8B8-E66616F1CBA7/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://51.15.231.96/4/3AFDF4A3-33B5-4028-B8B8-E66616F1CBA7/index.php https://threatfox.abuse.ch/ioc/160011/

Intelligence


File Origin
# of uploads :
2
# of downloads :
214
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
13979361D20B6C7184A7D3A8E5454782162A4AB734D2F.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-13 11:18:56 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
80 / 100
Signature
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 447898 Sample: 13979361D20B6C7184A7D3A8E54... Startdate: 13/07/2021 Architecture: WINDOWS Score: 80 61 carambaslonekal.top 2->61 75 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 11 other signatures 2->81 10 13979361D20B6C7184A7D3A8E5454782162A4AB734D2F.exe 2 2->10         started        signatures3 process4 file5 43 13979361D20B6C7184...82162A4AB734D2F.tmp, PE32 10->43 dropped 13 13979361D20B6C7184A7D3A8E5454782162A4AB734D2F.tmp 28 39 10->13         started        process6 file7 45 C:\Program Files (x86)\...\is-EEN99.tmp, PE32 13->45 dropped 47 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->47 dropped 49 C:\Program Files (x86)\...\is-5B5IA.tmp, PE32 13->49 dropped 51 17 other files (none is malicious) 13->51 dropped 16 vv.sfx.exe 7 13->16         started        19 updata.sfx.exe 7 13->19         started        21 cmd.exe 1 13 13->21         started        process8 file9 39 C:\Program Files (x86)\...\vv.exe, PE32 16->39 dropped 23 vv.exe 16->23         started        41 C:\Program Files (x86)\...\updata.exe, PE32 19->41 dropped 26 updata.exe 20 12 19->26         started        29 iexplore.exe 2 85 21->29         started        31 conhost.exe 21->31         started        process10 dnsIp11 83 Injects a PE file into a foreign processes 23->83 33 vv.exe 23->33         started        63 51.15.231.96, 49732, 80 OnlineSASFR France 26->63 65 iplogger.org 29->65 37 iexplore.exe 34 29->37         started        signatures12 process13 dnsIp14 53 ip-api.com 208.95.112.1, 49731, 80 TUT-ASUS United States 33->53 55 carambaslonekal.top 33->55 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->67 69 Tries to steal Instant Messenger accounts or passwords 33->69 71 Tries to steal Mail credentials (via file access) 33->71 73 Tries to harvest and steal browser information (history, passwords, etc) 33->73 57 iplogger.org 88.99.66.31, 443, 49724, 49725 HETZNER-ASDE Germany 37->57 59 192.168.2.1 unknown unknown 37->59 signatures15
Threat name:
Win32.Trojan.Chapak
Status:
Malicious
First seen:
2019-06-26 13:28:36 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Unpacked files
SH256 hash:
e5345e604b939458138247c8a144213ca44de3558565bb74d8207a6f8d2f7c30
MD5 hash:
45cfd0b59e94b292407aad04d2e4afb5
SHA1 hash:
53a1c17b868a0364affdcb5645bdb4784491c9b6
Detections:
win_vidar_g0 win_vidar_auto
SH256 hash:
5a89294a7ab901f76db048ee31f9fba2e0d14019ef8d62a085ae47b3ef682874
MD5 hash:
d5a21b21286aeafa35f0e07c28265cbc
SHA1 hash:
e29e62d29fe299e18a6494cc8f0080927e3effc5
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
a2b539127bd09026eb069f3b1206feb3f04348187553bd5282c145dd94b9dbed
MD5 hash:
9977165aac7e64dd934d14dbd448d397
SHA1 hash:
f35621d05780cfb1b71598a6502685ac1d410c81
SH256 hash:
f73eb80a8972f0d5cf8629ca998b97ca1acf159bf4c38b20bd4d8fc6f1e08e5b
MD5 hash:
ea8f6e311475ea00cf22806aed482d14
SHA1 hash:
b5f33b91ccb2848321b11b13a35b6b4e1a0a4262
SH256 hash:
324efa733fe0f6e71d19ca25601808f90b95cea99f8fdc75d9c437196f39bfff
MD5 hash:
21020d6d80c824c9e063241c3bd9356d
SHA1 hash:
6cccf350b1e27886cdcee4655f7e06454b0dc6bb
SH256 hash:
677d452ddd1c161f51d364691d8a47f936fe69f13c6529e32fcf948f4b6bdc0b
MD5 hash:
b33c1fdbd080e525627d482e599ddcfa
SHA1 hash:
63fd26556e1557ec1db6f3bcf166da34969cf14c
SH256 hash:
1c9b08033bb27b0d5c036789372a5cba763a7576de60fb393a672a45b0cf123d
MD5 hash:
477f7aae873fd0898fb7fe5a81b1e146
SHA1 hash:
54ef2d847dfb07a6986b203fe990de6d4ae4abdf
SH256 hash:
3b2d5f574f69181a533d339a077570a6aad143c54b19907dc71c2539d70e5b07
MD5 hash:
f7437c53220aeeb53e8bf5a16ff2b10f
SHA1 hash:
6dbb6e8684c5b5e6c67d68d63c35340edf591831
SH256 hash:
4eb7cd49b2877f9a0142234a17beb9bb78a6aa6690631d9f06b3a9c7b4334000
MD5 hash:
69bdeb8a5994ddf63871087c613c60a9
SHA1 hash:
6770cf97328d1152cfbc7c6195190f22246d51e3
SH256 hash:
ec41f19231e726192a815bc574131aa059f59b33721524b6541892d399b03c64
MD5 hash:
377165d64e506222c6731e7febbee91a
SHA1 hash:
6363d5101afc79d1a199e4ffe5e37f7e5bdca63f
SH256 hash:
582556c96fbc6c20956380a7c51b99de514ba064141485fa4107eaad459b9cb1
MD5 hash:
e1f92e571cb32ac17452f5911d5e7074
SHA1 hash:
42a9a505cbb3cd3399a38423ab2e7ad289b45495
SH256 hash:
aee48020feb9b8bb88f9121263d3abbd238b8816ca2c172ad6fda7ac06794b57
MD5 hash:
6145c6a7c6d8d2254c79deb7b2df1636
SHA1 hash:
2664cb8530eddab2c2bbabccaf723a137cc53ae9
SH256 hash:
8e16f5730c286f3c7a88ec17bb5ea297b3a25f240fde12e8dc97c23195b08664
MD5 hash:
a1b37230856caac08f2a6a4039cdaffe
SHA1 hash:
f9fc06a82fa6ad896662c969896ca6ae72b5607f
SH256 hash:
13979361d20b6c7184a7d3a8e5454782162a4ab734d2f9a01ed8421aeea5eee9
MD5 hash:
e94f95f1e37393658a2f5d2d92bfb982
SHA1 hash:
3a00a1b5748b4bc617dbb1343379e8ad6913696d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AZORult

Executable exe 13979361d20b6c7184a7d3a8e5454782162a4ab734d2f9a01ed8421aeea5eee9

(this sample)

  
Delivery method
Distributed via web download

Comments