MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6707f8585bc86cee81fa957414be0bcfc707b1786d372b057de4cc0f30d2af08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: 6707f8585bc86cee81fa957414be0bcfc707b1786d372b057de4cc0f30d2af08
SHA3-384 hash: eb76092cfc8cf84885283669d402400f26bfcaa4a023db03e2e5ac4a8cc48073b3056460bed83c53bdaffbcc64cd2181
SHA1 hash: 2dded58f57f22fdfd389fd8b4df1b95267f7a096
MD5 hash: 8ba8a8618deb4d33788a752797912dc2
humanhash: speaker-white-louisiana-carbon
File name:HalkbankEkstre310521657876007850.exe
Download: download sample
Signature AZORult
File size:164'736 bytes
First seen:2021-05-31 12:01:06 UTC
Last seen:2021-05-31 13:18:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fa974366048f9c551ef45714595665e (946 x Formbook, 398 x Loki, 261 x AgentTesla)
ssdeep 3072:8Lk395hYXJvMDAHDJh1OX/wLuZKPolAUswWCEfO3gtYWX1Knxnp:8Qq+D2DL1OvwLizAUswWlO3Fac9p
Threatray 1'416 similar samples on MalwareBazaar
TLSH 15F3015B77D0C4EFC91392B105A7A7A4DABAD3802335165B3F944FBA39222938D27583
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://ppdb.smkn1cilegon.sch.id/huPl/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://ppdb.smkn1cilegon.sch.id/huPl/index.php https://threatfox.abuse.ch/ioc/67864/

Intelligence


File Origin
# of uploads :
2
# of downloads :
305
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
HalkbankEkstre310521657876007850.exe
Verdict:
Malicious activity
Analysis date:
2021-05-31 12:03:13 UTC
Tags:
installer trojan rat azorult stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Sending a UDP request
Creating a window
Forced shutdown of a system process
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult
Detection:
malicious
Classification:
spyw
Score:
68 / 100
Signature
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-05-31 12:01:22 UTC
AV detection:
11 of 28 (39.29%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult infostealer spyware stealer trojan
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Reads local data of messenger clients
Azorult
Malware Config
C2 Extraction:
http://ppdb.smkn1cilegon.sch.id/huPl/index.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments