MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 1 File information Comments

SHA256 hash: 9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553
SHA3-384 hash: 4da3cbf1f31a3aed94f8ec4984edc84ce6c65c51424c453bd0844fde7ec0199719ab3f38b502c728c69cfe8af4f38552
SHA1 hash: 9d7d404930cf891bf54a034bf9c9f943e42fba14
MD5 hash: 253732efc73b152f1f2d496413ed232c
humanhash: nitrogen-seven-blossom-nevada
File name:9D227EB3F4FF27C39D61130FAE6458B06A33EE315A6E2.exe
Download: download sample
Signature AZORult
File size:1'060'864 bytes
First seen:2022-02-06 08:32:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c48c98d8d11cf51c73b194502a508be7 (4 x RaccoonStealer, 3 x AZORult, 1 x AgentTesla)
ssdeep 12288:l9SCVijMRXOtQt09oz4FMGH9uct73wNIX0809wFPXtQA:l9bVijMRXOttoz4FM0oeDAa080uT
Threatray 11'161 similar samples on MalwareBazaar
TLSH T12E35F161A995A8F3D04F65BAABA1B6D04238FD3A64E70547F30C3D1DEB33941D912723
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://91.219.236.18/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.236.18/ https://threatfox.abuse.ch/ioc/378337/

Intelligence


File Origin
# of uploads :
1
# of downloads :
511
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
9D227EB3F4FF27C39D61130FAE6458B06A33EE315A6E2.exe
Verdict:
Malicious activity
Analysis date:
2022-02-06 09:57:13 UTC
Tags:
trojan stealer vidar rat azorult raccoon loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
DNS request
Unauthorized injection to a recently created process
Sending a custom TCP request
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Query of malicious DNS domain
Sending an HTTP GET request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm control.exe greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult Oski Stealer Raccoon Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Oski Stealer
Yara detected Raccoon Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 567162 Sample: 9D227EB3F4FF27C39D61130FAE6... Startdate: 06/02/2022 Architecture: WINDOWS Score: 100 89 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->89 91 Multi AV Scanner detection for domain / URL 2->91 93 Found malware configuration 2->93 95 15 other signatures 2->95 9 9D227EB3F4FF27C39D61130FAE6458B06A33EE315A6E2.exe 13 2->9         started        process3 signatures4 101 Creates HTML files with .exe extension (expired dropper behavior) 9->101 103 Maps a DLL or memory area into another process 9->103 12 9D227EB3F4FF27C39D61130FAE6458B06A33EE315A6E2.exe 21 9->12         started        process5 dnsIp6 83 underdohag.ac.ug 185.215.113.77, 49756, 49757, 49764 WHOLESALECONNECTIONSNL Portugal 12->83 85 rebrand.ly 34.236.161.218, 49754, 49755, 80 AMAZON-AESUS United States 12->85 87 5 other IPs or domains 12->87 67 C:\Users\user\AppData\...\CcmfdgsaYsd.exe, PE32 12->67 dropped 69 C:\Users\user\AppData\Local\...\zxcv[1].EXE, PE32 12->69 dropped 71 C:\Users\user\AppData\Local\...\zxcvb[1].exe, PE32 12->71 dropped 73 C:\Users\user\AppData\...\CHmfdgaYsHsd.exe, PE32 12->73 dropped 111 Hides threads from debuggers 12->111 17 CcmfdgsaYsd.exe 7 12->17         started        21 CHmfdgaYsHsd.exe 4 12->21         started        file7 signatures8 process9 file10 39 C:\Users\user\AppData\Local\...\dfgasdme.exe, PE32 17->39 dropped 41 C:\Users\user\AppData\Local\...\Dbvsdfe.exe, PE32 17->41 dropped 97 Maps a DLL or memory area into another process 17->97 23 CcmfdgsaYsd.exe 27 17->23         started        28 Dbvsdfe.exe 4 17->28         started        30 dfgasdme.exe 4 17->30         started        signatures11 process12 dnsIp13 79 91.219.236.18, 49766, 80 SERVERASTRA-ASHU Hungary 23->79 81 5.252.178.180, 49765, 80 MIVOCLOUDMD Moldova Republic of 23->81 59 C:\Users\user\AppData\...\vcruntime140.dll, PE32 23->59 dropped 61 C:\Users\user\AppData\...\ucrtbase.dll, PE32 23->61 dropped 63 C:\Users\user\AppData\...\softokn3.dll, PE32 23->63 dropped 65 7 other files (none is malicious) 23->65 dropped 105 Tries to steal Mail credentials (via file / registry access) 23->105 107 Tries to harvest and steal browser information (history, passwords, etc) 23->107 109 Maps a DLL or memory area into another process 28->109 32 Dbvsdfe.exe 29 28->32         started        37 dfgasdme.exe 22 30->37         started        file14 signatures15 process16 dnsIp17 75 pretorian.ug 32->75 43 C:\ProgramData\vcruntime140.dll, PE32 32->43 dropped 45 C:\ProgramData\sqlite3.dll, PE32 32->45 dropped 47 C:\ProgramData\softokn3.dll, PE32 32->47 dropped 55 4 other files (none is malicious) 32->55 dropped 99 Tries to harvest and steal browser information (history, passwords, etc) 32->99 77 underdohag.ac.ug 37->77 49 C:\...\api-ms-win-core-memory-l1-1-0.dll, PE32 37->49 dropped 51 api-ms-win-core-localization-l1-2-0.dll, PE32 37->51 dropped 53 api-ms-win-core-libraryloader-l1-1-0.dll, PE32 37->53 dropped 57 10 other files (none is malicious) 37->57 dropped file18 signatures19
Threat name:
Win32.Ransomware.Locky
Status:
Malicious
First seen:
2020-09-12 23:24:10 UTC
File Type:
PE (Exe)
Extracted files:
87
AV detection:
38 of 43 (88.37%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:125d9f8ed76e486f6563be097a710bd4cba7f7f2 discovery infostealer spyware stealer suricata trojan
Behaviour
Checks processor information in registry
Kills process with taskkill
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Azorult
Oski
Raccoon
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32.Raccoon Stealer Checkin M6
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
pretorian.ug
Unpacked files
SH256 hash:
21e2d0ba0eb08a76e21deb0b995119892236c18c4e7865329adfe7fd26f5ed06
MD5 hash:
3147c763afd20b9105f14ee97149de59
SHA1 hash:
d200e830b9a5f78536e2d1197a24022a2cca83b2
SH256 hash:
9d227eb3f4ff27c39d61130fae6458b06a33ee315a6e2a8fd84afe08d49ce553
MD5 hash:
253732efc73b152f1f2d496413ed232c
SHA1 hash:
9d7d404930cf891bf54a034bf9c9f943e42fba14
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Meteorite
Author:ditekSHen
Description:Detects Meteorite downloader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments