MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a4c57df59f0c85eebcb7b40263d8c3de037f41b7d2d43b6d34e7baf72a2e1448. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 1 File information Comments

SHA256 hash: a4c57df59f0c85eebcb7b40263d8c3de037f41b7d2d43b6d34e7baf72a2e1448
SHA3-384 hash: 4ae565b4321b70f0fa6af734dbe015d254bfea6e22ef1af6e9f03802908dd719973f48bbdcf6cae0c0ada17519fd7121
SHA1 hash: 1cbf86c566c48f60e053784dec2c1c997d5dafac
MD5 hash: 7190324e3ae89886619d92f2e632395e
humanhash: bakerloo-bulldog-ten-single
File name:A4C57DF59F0C85EEBCB7B40263D8C3DE037F41B7D2D43.exe
Download: download sample
Signature AZORult
File size:2'602'820 bytes
First seen:2021-06-07 05:41:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 49152:iAI+7vmuNxnOc82Z4IsJM6rOj3fwcAM3AOR3JgweGlvoBSEAZaPr5+T6to2IoNsp:iAI+5nOJIsJhrOrf9p3pgMiSazYOm/+q
Threatray 110 similar samples on MalwareBazaar
TLSH E0C53325F001463BC0620F398E879272F9777F041F29D58FB3ED2D098A7725B669C296
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://185.212.128.68/newpan/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.212.128.68/newpan/index.php https://threatfox.abuse.ch/ioc/72135/

Intelligence


File Origin
# of uploads :
1
# of downloads :
251
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
A4C57DF59F0C85EEBCB7B40263D8C3DE037F41B7D2D43.exe
Verdict:
No threats detected
Analysis date:
2021-06-07 05:45:17 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the %AppData% subdirectories
Deleting a recently created file
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Sending a UDP request
Searching for the window
Launching a process
DNS request
Sending a custom TCP request
Creating a file in the Windows subdirectories
Using the Windows Management Instrumentation requests
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Azorult
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Uses regedit.exe to modify the Windows registry
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 430293 Sample: A4C57DF59F0C85EEBCB7B40263D... Startdate: 07/06/2021 Architecture: WINDOWS Score: 100 53 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->53 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 10 other signatures 2->59 7 A4C57DF59F0C85EEBCB7B40263D8C3DE037F41B7D2D43.exe 47 30 2->7         started        process3 file4 31 C:\Users\user\AppData\Roaming\...\rlib.exe, PE32 7->31 dropped 33 C:\Users\user\AppData\...\RAMExpert.exe, PE32 7->33 dropped 35 C:\Users\user\AppData\Roaming\...\rama.reg, Little-endian 7->35 dropped 37 3 other files (none is malicious) 7->37 dropped 61 Uses regedit.exe to modify the Windows registry 7->61 11 livc.exe 19 7->11         started        15 RAMExpert.exe 19 7->15         started        17 rlib.exe 8 7->17         started        20 6 other processes 7->20 signatures5 process6 dnsIp7 47 185.212.128.68, 49776, 80 INTERNET-ITNL Germany 11->47 63 Antivirus detection for dropped file 11->63 65 Multi AV Scanner detection for dropped file 11->65 67 Detected unpacking (changes PE section rights) 11->67 69 Machine Learning detection for dropped file 11->69 49 www.kcsoftwares.com 46.105.204.2, 443, 49736, 49737 OVHFR France 15->49 71 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 15->71 73 Query firmware table information (likely to detect VMs) 15->73 75 Queries memory information (via WMI often done to detect virtual machines) 15->75 77 Contains functionality to detect sleep reduction / modifications 15->77 27 C:\Users\user\AppData\Roaming\...\livc.exe, PE32 17->27 dropped 29 C:\Users\user\AppData\Roaming\...\libm.exe, PE32 17->29 dropped 51 2no.co 20->51 22 iexplore.exe 20->22         started        25 iexplore.exe 20->25         started        file8 signatures9 process10 dnsIp11 39 2no.co 88.99.66.31, 443, 49738, 49739 HETZNER-ASDE Germany 22->39 41 googleads.g.doubleclick.net 172.217.22.226, 443, 49754, 49755 GOOGLEUS United States 25->41 43 pagead46.l.doubleclick.net 172.217.23.66, 443, 49762, 49763 GOOGLEUS United States 25->43 45 7 other IPs or domains 25->45
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2018-11-22 19:58:00 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult discovery infostealer trojan
Behaviour
Modifies Internet Explorer settings
Modifies registry class
Runs .reg file with regedit
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Azorult
Malware Config
C2 Extraction:
http://185.212.128.68/newpan/index.php
Unpacked files
SH256 hash:
2cfdebe107c2ddba4ac5f9e313ea8175ade38e0838030b50904d99ae86dd7475
MD5 hash:
96db9fdac8cdd27965cc72162330fb5c
SHA1 hash:
81ee2beaa95be7a9c7e3ab49894bff31ba51b5fc
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
c34459e9f24f71a16becc41836e984c3b3a5df32c42df8376263c1fb7c27ba0d
MD5 hash:
95be8a7684c9e5ebe5be502bb8c515dd
SHA1 hash:
fc101b2972108d5f93d2c064d3a459d7bba275d1
SH256 hash:
44eb5bf6acf003d57fd1fa23ef612dcd2fc4485ce670049ebef0a6aa8c87b885
MD5 hash:
9778d36c2a79995ba0694473d701448c
SHA1 hash:
f7c920816b20f480e71aa0575e979ad04942a7bd
SH256 hash:
36ef3d981027d9cd8747daeba56fd3b006e25212922b18f581af3ad719ad7c5c
MD5 hash:
2b36a7310a5fe4f9e318ffd50470d583
SHA1 hash:
b994b40ad19722e14b06cdf0404d71cc3305fe33
SH256 hash:
a45cd175b7435dc0b834ecc6f530dd9d86d7253d40e78587e4853f92c68fb92a
MD5 hash:
cbd7320003d2d856d032424523bd0a1b
SHA1 hash:
6a0995d96a8eaae3f24de75f33cad528b0eb7ed0
SH256 hash:
f266d8fc2354904ea0d6df71d0d3cbf01e88ba0dad1d2ab0c2a01839b8efc279
MD5 hash:
12204026eb75b75486c95729df22a4a9
SHA1 hash:
23861e09df34a13b2dc0def1ed8d7fc48f0e3b82
SH256 hash:
a4c57df59f0c85eebcb7b40263d8c3de037f41b7d2d43b6d34e7baf72a2e1448
MD5 hash:
7190324e3ae89886619d92f2e632395e
SHA1 hash:
1cbf86c566c48f60e053784dec2c1c997d5dafac
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments