MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4a2311968fb73e55620ce972659fc74159f8127ebccb826d3150bc6d19c0f793. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 4a2311968fb73e55620ce972659fc74159f8127ebccb826d3150bc6d19c0f793
SHA3-384 hash: 5927eeb0fff16c9e54c644610b4dc87a7c9d622da1b25a1a868904e5e446eada0c93f237d9ba065547205b78e718dc3f
SHA1 hash: 234a12dc0c2200b7377e083b494415ec71907b3b
MD5 hash: 5885d8324b2988ffb10b388de3126f17
humanhash: rugby-michigan-golf-august
File name:4a2311968fb73e55620ce972659fc74159f8127ebccb826d3150bc6d19c0f793
Download: download sample
Signature AZORult
File size:905'904 bytes
First seen:2020-11-12 14:02:03 UTC
Last seen:2024-07-24 13:54:08 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 12288:3hAgFpuZsJD2b/pM/gYCEYDW8YF+8ay4hMH6FpfMHuVE:iauZsJD8R5zC4fauVE
Threatray 397 similar samples on MalwareBazaar
TLSH 6415668814A9238AD07773BE5B74348183B9EA5372F8C9D3029CBBB1EE9DC355771A05
Reporter seifreed
Tags:AZORult

Intelligence


File Origin
# of uploads :
2
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Creating a file
Connection attempt to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-11-12 14:04:05 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult infostealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Azorult
Malware Config
C2 Extraction:
http://185.222.58.102/don/index.php
Unpacked files
SH256 hash:
4a2311968fb73e55620ce972659fc74159f8127ebccb826d3150bc6d19c0f793
MD5 hash:
5885d8324b2988ffb10b388de3126f17
SHA1 hash:
234a12dc0c2200b7377e083b494415ec71907b3b
SH256 hash:
fccbff616e2901b6739514ef57f96efd7b59e4ece247213c98d09036249b6ecb
MD5 hash:
a0367d04e4e640b4a315e248a3e5abbc
SHA1 hash:
3298bded8403de0c2cc7723a5bb2dc58323d0808
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
83c08f0721c8b0c96e3d6a8f3ccaf5c96fbcc427d574625c34424c3429fefaa1
MD5 hash:
3c5dbcc3bb27e913e14efd8054811373
SHA1 hash:
b0eba9388abddaef9d5aa49ccd5dbab2924cced0
SH256 hash:
9d61d3528a5a28d10d7135ec3493faa9b0534d9e14b0b3819aeed858075f5929
MD5 hash:
077bd8de6de695f0965781f5a55a30c3
SHA1 hash:
be9f10faea54af6704838c159883d1bb9b37244f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments