MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7aaf2650f6e2914340ca5230eec2da557e4045ce9cf20ada8ba8e4d5d2228d7b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 7aaf2650f6e2914340ca5230eec2da557e4045ce9cf20ada8ba8e4d5d2228d7b
SHA3-384 hash: 45e48a2e33161d8f3059949ac472bca0e8795f449ad8dd74d602abdd4408994cf1068157c6e97adef2498462ec23fd7e
SHA1 hash: 69630788640cf3d13123cfddbbde88bbca1091c0
MD5 hash: bfc540e107105f338e3ffd51684a95cb
humanhash: ink-football-asparagus-berlin
File name:Contratos Metal Market.exe
Download: download sample
Signature AZORult
File size:408'427 bytes
First seen:2021-08-18 10:05:21 UTC
Last seen:2021-08-18 10:57:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6b1520ba8a8e7d12cecb5bd04c747ffc (2 x AZORult, 1 x Formbook, 1 x SnakeKeylogger)
ssdeep 12288:9+4txFPMBur44CyzbwNq0Lr/IJ+StcyM/CCM98:9+4hMA8pgIlLrwJ+bfvM98
Threatray 903 similar samples on MalwareBazaar
TLSH T18F94BF55E6818036E9F31E7EC1EB5178193C7B71172E5AEB1B985FA87F340C16A30A23
dhash icon 68f4f4d0f4f0d8c4 (2 x AZORult, 1 x AveMariaRAT)
Reporter adrian__luca
Tags:AZORult exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Contratos Metal Market.exe
Verdict:
Malicious activity
Analysis date:
2021-08-18 10:06:03 UTC
Tags:
trojan rat azorult

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.FormBook
Status:
Malicious
First seen:
2021-08-18 03:05:55 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult discovery infostealer trojan
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Azorult
Malware Config
C2 Extraction:
http://cwownola.org/AqwE/index.php
Unpacked files
SH256 hash:
b3a8e238ad314032c77d69403dadf501442e50d50d9899fc06cfd2d2350c308c
MD5 hash:
d35047b14eaaccdddf9ae6c9937a39ff
SHA1 hash:
3bb968172f385a73446e8a55e04a5ec606471523
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
7aaf2650f6e2914340ca5230eec2da557e4045ce9cf20ada8ba8e4d5d2228d7b
MD5 hash:
bfc540e107105f338e3ffd51684a95cb
SHA1 hash:
69630788640cf3d13123cfddbbde88bbca1091c0
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

01770557e5a2ef6790f0ddede03a4beced095df2a164db489aac4d3a858778c9

AZORult

Executable exe 7aaf2650f6e2914340ca5230eec2da557e4045ce9cf20ada8ba8e4d5d2228d7b

(this sample)

  
Dropped by
SHA256 01770557e5a2ef6790f0ddede03a4beced095df2a164db489aac4d3a858778c9
  
Delivery method
Distributed via e-mail attachment

Comments