MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d2e841645576d0eefcc6bcc6c0d480c0c6874f05a56e92441319a5c41b38979. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: 5d2e841645576d0eefcc6bcc6c0d480c0c6874f05a56e92441319a5c41b38979
SHA3-384 hash: 12865b99bf1e961e416ff3bc8de612aa25d68be50bc1a17530e967c6bf5add1e2b25e9eb02d2517ed47f7438639c65f4
SHA1 hash: 73f324a4eaca1309f0442fa1cd48a88c8dd06067
MD5 hash: 6304e54325ff26109e8dcea07bfd74ad
humanhash: mockingbird-october-carolina-purple
File name:file
Download: download sample
Signature AZORult
File size:8'157'696 bytes
First seen:2023-06-06 13:47:33 UTC
Last seen:2023-06-06 14:34:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 49152:tYK6zAl53s3948uRrf2Bf7rWwDyOc726tWbO8pU59QVHQ73keV5UhQ2U+Y75ka6U:5
Threatray 2'145 similar samples on MalwareBazaar
TLSH T1AD86013206A3FCFF97AD3944D4422B510CC868B3621857ACFE5104EF29F5768A97A9F4
TrID 53.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
12.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.5% (.SCR) Windows screen saver (13097/50/3)
7.6% (.EXE) Win64 Executable (generic) (10523/12/4)
4.7% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
Reporter jstrosch
Tags:.NET AZORult exe MSIL

Intelligence


File Origin
# of uploads :
2
# of downloads :
304
Origin country :
US US
Vendor Threat Intelligence
Malware family:
azorult
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-06-06 13:48:11 UTC
Tags:
rat azorult trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Launching a process
Creating a process with a hidden window
Sending a custom TCP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Sending a TCP request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
stealer
Result
Verdict:
MALICIOUS
Result
Threat name:
RHADAMANTHYS
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Creates processes via WMI
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected RHADAMANTHYS Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 882669 Sample: file.exe Startdate: 06/06/2023 Architecture: WINDOWS Score: 100 51 nickshort.ug 2->51 53 falling.ug 2->53 55 Snort IDS alert for network traffic 2->55 57 Antivirus / Scanner detection for submitted sample 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 7 other signatures 2->61 9 file.exe 5 2->9         started        13 WmiPrvSE.exe 2->13         started        15 IsMailNewsSave.exe 2->15         started        signatures3 process4 file5 39 C:\Users\user\...\Ixgzydftvdfqbldoxvzktk.exe, PE32 9->39 dropped 41 C:\Users\user\AppData\Local\...\file.exe.log, ASCII 9->41 dropped 71 Encrypted powershell cmdline option found 9->71 73 Injects a PE file into a foreign processes 9->73 17 file.exe 1 9->17         started        20 Ixgzydftvdfqbldoxvzktk.exe 3 9->20         started        23 powershell.exe 15 9->23         started        25 ubJvAff8B4.exe 13->25         started        27 h%%Mj.exe 13->27         started        75 Antivirus detection for dropped file 15->75 77 Multi AV Scanner detection for dropped file 15->77 79 Machine Learning detection for dropped file 15->79 signatures6 process7 dnsIp8 49 94.142.138.208, 2665, 49701, 49702 IHOR-ASRU Russian Federation 17->49 29 certreq.exe 3 17->29         started        63 Antivirus detection for dropped file 20->63 65 Multi AV Scanner detection for dropped file 20->65 67 Machine Learning detection for dropped file 20->67 69 2 other signatures 20->69 33 Ixgzydftvdfqbldoxvzktk.exe 5 20->33         started        35 conhost.exe 23->35         started        signatures9 process10 file11 43 C:\Users\user\AppData\...\ubJvAff8B4.exe, PE32 29->43 dropped 45 C:\Users\user\AppData\Local\...\h%%Mj.exe, PE32 29->45 dropped 81 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->81 83 Tries to steal Mail credentials (via file / registry access) 29->83 85 Tries to harvest and steal browser information (history, passwords, etc) 29->85 87 2 other signatures 29->87 37 conhost.exe 29->37         started        47 C:\Users\user\AppData\...\IsMailNewsSave.exe, PE32 33->47 dropped signatures12 process13
Threat name:
ByteCode-MSIL.Trojan.Remcos
Status:
Malicious
First seen:
2023-05-28 14:11:04 UTC
File Type:
PE (.Net Exe)
Extracted files:
8
AV detection:
28 of 37 (75.68%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult collection discovery infostealer spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Azorult
Process spawned unexpected child process
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
Unpacked files
SH256 hash:
da9f942ebf943586f919fdb4ec37fc50268f93c22133726189a35cbeebec1adb
MD5 hash:
92c069d54d614e20e22844b1f3c10a35
SHA1 hash:
f502e824a26194c1125ea73201e3ab9ad1a3fe9c
SH256 hash:
6b77e2bfff019609c509c3e559c6870dbb7e8d8b9979affb98440e079c99e354
MD5 hash:
958e4d62824c29a594256646c3d6bbf9
SHA1 hash:
e2f2004a3932381c8e70ecde39a129f0f6add9b0
SH256 hash:
1171c7908d73374c9632680e0bb9f2f89bd5f1b3839d2e7cd9a4bd3db8cfc001
MD5 hash:
d3bf72627ea40e0ce7944b9b906c699e
SHA1 hash:
d2679a3e0b715622d312d0f3ab78146fe3f48155
SH256 hash:
2faa418fb849c9ddc9b1b2e7e2344e052f5ffc92c47b2490547cd631fee28a49
MD5 hash:
13629a2de841312f3654604577c9f0a7
SHA1 hash:
d15d04f6cfc6ceb6934576a77319c2039db6b9ab
SH256 hash:
4d7e2696b1f30629bc33129250e1140da3a5381006661560aab0cad3e0f27934
MD5 hash:
efb69b84efb5ce64d63af92bcc335cce
SHA1 hash:
fbffa41b332ee53739ec03de44983012bbc95ff8
SH256 hash:
2782d8b695ddcc907317e9b0296dcd7d32145a41d9c9ffb6a89c6abcb3c4a019
MD5 hash:
96d9e9c5e55a5c29bedd195c0a8bef24
SHA1 hash:
73a9a7d6b7c501efa1eab43d5fb943a2988b34ab
SH256 hash:
20c9f38af3c5d715d9722f0eaa03d6e77616b8bce3d91db8a36fc3add23685bd
MD5 hash:
dc187de46aefb5cfa30eb2909f116537
SHA1 hash:
dc264b2293a71d5e20262e19b4a5c54bd8c352d8
SH256 hash:
ff8c24bce1eb009f0d5c47a09b96caf02726c285cea0d635082ad4da27e63d1b
MD5 hash:
9d6ec6072ee1814a4a01d1eb3fb67ba1
SHA1 hash:
d0b416de1c900b6bcb35dc182b2e8744f16c3289
SH256 hash:
f4ce8a3c606a9f3ed7654b15723dbbec1a09dbd6a8827cb700762924dcfc01b8
MD5 hash:
7be73fa204d8cc825f6e5c187472cc93
SHA1 hash:
99e59959a9cb4b019988b5fc2a39b8460d1b4db4
SH256 hash:
d921d39ac3b27fabb53592c4e4ceecef6a8f8dd8ea35a44415d8f7a52b6686f3
MD5 hash:
6c0312133bcbcd406ff6e598c300e487
SHA1 hash:
551c1365bce6b7b463c9e3e6d5fdabebe74374c7
Detections:
win_brute_ratel_c4_w0
SH256 hash:
5d2e841645576d0eefcc6bcc6c0d480c0c6874f05a56e92441319a5c41b38979
MD5 hash:
6304e54325ff26109e8dcea07bfd74ad
SHA1 hash:
73f324a4eaca1309f0442fa1cd48a88c8dd06067
Malware family:
AZORult v3
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:BruteSyscallHashes
Author:Embee_Research @ Huntress
Rule name:pe_imphash
Rule name:reverse_http
Author:CD_R0M_
Description:Identify strings with http reversed (ptth)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_brute_ratel_c4_w0
Author:Embee_Research @ Huntress

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

AZORult

Executable exe 5d2e841645576d0eefcc6bcc6c0d480c0c6874f05a56e92441319a5c41b38979

(this sample)

Comments