MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8dda41b34e9b16da333bfa30653a6f46be67c657158ecfd2c0463903b01e54d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: c8dda41b34e9b16da333bfa30653a6f46be67c657158ecfd2c0463903b01e54d
SHA3-384 hash: b2061c0264932e869bbca6b345b70685ade82896c44d8deb967b760787a5bf840968ca8299d0b2d48375366b419af33c
SHA1 hash: 119a9cd7907658400441708282ad58fb42c7ffec
MD5 hash: 7163db70565abe42159c2389c6075fcb
humanhash: papa-minnesota-paris-floor
File name:Price inquiry,pdf.scr
Download: download sample
Signature AZORult
File size:663'896 bytes
First seen:2020-08-18 12:54:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1d3807efc70a0a5a6d2ab497250e9cb5 (4 x RemcosRAT, 1 x AZORult, 1 x AveMariaRAT)
ssdeep 12288:7m/ZNPa2c/PWwuUDKcoEwWLC2W2nKjdkOdqY55w/aPXjlBeh0niI:7m/TyzPWwuUDpoEwECcKpkON/hno0B
Threatray 325 similar samples on MalwareBazaar
TLSH 63E49E62E6804837C0531578AC0B9FE9D937AF113B98AC476BE63E0C5F397D17A29097
Reporter abuse_ch
Tags:AZORult geo Halkbank scr TUR


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: halkbank.com.tr
Sending IP: 185.222.58.113
From: Sasco Purchase - Liaqat <ekstre@halkbank.com.tr>
Subject: Urgent -- Price inquiry
Attachment: Price inquiry,pdf.001 (contains "Price inquiry,pdf.scr")

Intelligence


File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Running batch commands
Creating a process with a hidden window
Sending an HTTP POST request
Creating a file in the %temp% subdirectories
Deleting a recently created file
Reading critical registry keys
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Unauthorized injection to a system process
Threat name:
Win32.Spyware.Agensla
Status:
Malicious
First seen:
2020-08-18 12:56:10 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  2/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
spyware trojan infostealer family:azorult
Behaviour
Checks processor information in registry
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
JavaScript code in executable
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Azorult
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AZORult

Executable exe c8dda41b34e9b16da333bfa30653a6f46be67c657158ecfd2c0463903b01e54d

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments