MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6e3efa36db00f2ffa417f70f688f1987861fe0281e809eba4ce7c285ab3da556. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: 6e3efa36db00f2ffa417f70f688f1987861fe0281e809eba4ce7c285ab3da556
SHA3-384 hash: 07d04bc4add88db7a7dfa3731cf485681fbc1d57f3f7cea0900e76323330803016347dd217d12b84f2db259144df25ee
SHA1 hash: 9052dce7eee7512718c4c3fd5912f41b2bd2439f
MD5 hash: fbd1a80389d206f33ade62eed461a83c
humanhash: florida-delta-venus-michigan
File name:6E3EFA36DB00F2FFA417F70F688F1987861FE0281E809.exe
Download: download sample
Signature AZORult
File size:956'416 bytes
First seen:2021-08-13 07:58:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 500ff1538958cc73738bf0c262a1773f (1 x AZORult)
ssdeep 12288:JCnArJmgeR3svVGf28ofhnEYDKF9eYoJEGPz2+tkqFhqZ5R:Jmf3sv18ofxEYD29fmlPiqFwZ
Threatray 864 similar samples on MalwareBazaar
TLSH T103156AE2A770DC61D3A02E778817B5EB2C3D5DD1AC62BA4F61B5790AFD7E5C38121202
dhash icon 07d0d8dcd4d8d007 (8 x RemcosRAT, 7 x FormBook, 2 x AgentTesla)
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://savacons.com/wp-az/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://savacons.com/wp-az/index.php https://threatfox.abuse.ch/ioc/184323/

Intelligence


File Origin
# of uploads :
1
# of downloads :
454
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6E3EFA36DB00F2FFA417F70F688F1987861FE0281E809.exe
Verdict:
Malicious activity
Analysis date:
2021-08-13 08:10:23 UTC
Tags:
trojan rat azorult

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AZORult
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Detected AZORult Info Stealer
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Rescoms
Status:
Malicious
First seen:
2018-11-13 16:47:12 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult infostealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Azorult
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M17
Malware Config
C2 Extraction:
http://savacons.com/wp-az/index.php
Unpacked files
SH256 hash:
1d01d8b003fe2db1fb5d691bfd37f9402de058b5aec67b11bc73b9c7d683f62d
MD5 hash:
018c0b35af3a590ba5898917daa44ad7
SHA1 hash:
7a742aeb09376e3bde40e6fa85027e72d5660605
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
6e3efa36db00f2ffa417f70f688f1987861fe0281e809eba4ce7c285ab3da556
MD5 hash:
fbd1a80389d206f33ade62eed461a83c
SHA1 hash:
9052dce7eee7512718c4c3fd5912f41b2bd2439f
Malware family:
AZORult
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments