MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9aee92df3530cb75fb37ffe332199dc0a61718a010d34fc48dbbe16fdd1b3154. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 9aee92df3530cb75fb37ffe332199dc0a61718a010d34fc48dbbe16fdd1b3154
SHA3-384 hash: 50d3d3adcd78c222de286765578fc17e8e12aa8d98aa47bf202df6e51bd86f21e9719dbc97938c9de94c012e2a7fb0f8
SHA1 hash: 1700afbdafcf20ee9deeee4165f6758403e7f43a
MD5 hash: 390ac19e8d4b6eba1a936a5052b6babf
humanhash: mango-oranges-failed-bulldog
File name:GRS66701.exe
Download: download sample
Signature AZORult
File size:154'863 bytes
First seen:2021-04-07 13:22:25 UTC
Last seen:2021-04-07 13:52:51 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 18bc6fa81e19f21156316b1ae696ed6b (51 x Formbook, 24 x Loki, 9 x SnakeKeylogger)
ssdeep 3072:NeYBCwqDxkJ0zzk3nW32gIEsc28HAmXmC6eLBJqoYovx14eN0ORow96H3r:NDIFYw2dEsN8HAUNPYMx145tw96H3r
Threatray 618 similar samples on MalwareBazaar
TLSH 51E3121966E044E7D89209340777B63AE37B8200242D2ACBCB1D9F3E2E769D3457C2E7
Reporter James_inthe_box
Tags:AZORult exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
GRS66701.exe
Verdict:
Malicious activity
Analysis date:
2021-04-07 13:24:20 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Unauthorized injection to a recently created process
DNS request
Sending a UDP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Contains functionality to prevent local Windows debugging
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Spynoon
Status:
Malicious
First seen:
2021-04-07 01:34:42 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult infostealer trojan
Behaviour
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Azorult
Malware Config
C2 Extraction:
http://staging.onyxa.pl/XyuTr/index.php
Unpacked files
SH256 hash:
9aee92df3530cb75fb37ffe332199dc0a61718a010d34fc48dbbe16fdd1b3154
MD5 hash:
390ac19e8d4b6eba1a936a5052b6babf
SHA1 hash:
1700afbdafcf20ee9deeee4165f6758403e7f43a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments