MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 caf1aeb2835afd01b7ddc5218ab7b3bfeae4c21dffc0c37111fe3238228791ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 11


Intelligence 11 IOCs YARA 5 File information Comments

SHA256 hash: caf1aeb2835afd01b7ddc5218ab7b3bfeae4c21dffc0c37111fe3238228791ea
SHA3-384 hash: 8bba6ac67b3c0afdfba6c59ab249da364f42d718699e0426803a79af6e932ea005948322ab8adf93ec69ba9d6d9efcb9
SHA1 hash: 67de77276772fa812d25dcf30518178f4ab8b28c
MD5 hash: 4294e8f4beb04035a9427305e0a98ea0
humanhash: alanine-salami-helium-eight
File name:Dekont.pdf.exe
Download: download sample
Signature AZORult
File size:937'984 bytes
First seen:2020-10-12 19:23:38 UTC
Last seen:2020-10-12 20:24:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:a15i+5/lz7DRokeo8ZfpzsNm+YWf8Q51T0JBS0tV5NeURVh4Zce9Rgz+gKESusKW:+/lN1gGd6aWVC9++gKLio69
Threatray 311 similar samples on MalwareBazaar
TLSH D015714AABA847D1C9F4F3FB2BA5722823E2FCF71750D60D1F0A79A519730E1598D206
Reporter abuse_ch
Tags:AZORult exe geo Halkbank TUR


Avatar
abuse_ch
Malspam distributing AZORult:

HELO: server.gmdsa.us
Sending IP: 31.214.245.90
From: Halkbank Internet Subesi <internet.subesi@halkbank.com.tr>
Subject: 12.10.2020 TARİHLİ DEKONT
Attachment: Dekont.pdf.img (contains "Dekont.pdf.exe")

AZORult C2:
http://pilsans.com/mxnjs/index.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Running batch commands
Creating a process with a hidden window
Creating a file
Launching cmd.exe command interpreter
Creating a process from a recently created file
Launching a process
DNS request
Unauthorized injection to a recently created process
Enabling autorun by creating a file
Unauthorized injection to a system process
Result
Threat name:
AZORult
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected AZORult Info Stealer
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 296898 Sample: Dekont.pdf.exe Startdate: 12/10/2020 Architecture: WINDOWS Score: 100 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Antivirus / Scanner detection for submitted sample 2->48 50 9 other signatures 2->50 9 Dekont.pdf.exe 2 2->9         started        13 set.exe 2->13         started        process3 file4 38 C:\Users\user\AppData\...\Dekont.pdf.exe.log, ASCII 9->38 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->60 15 cmd.exe 1 9->15         started        17 cmd.exe 2 9->17         started        62 Writes to foreign memory regions 13->62 64 Allocates memory in foreign processes 13->64 66 Injects a PE file into a foreign processes 13->66 20 mscorsvw.exe 12 13->20         started        signatures5 process6 dnsIp7 23 set.exe 3 15->23         started        26 conhost.exe 15->26         started        36 C:\Users\user\Desktop\set.exe, PE32 17->36 dropped 28 conhost.exe 17->28         started        42 pilsans.com 20->42 file8 process9 signatures10 52 Antivirus detection for dropped file 23->52 54 Multi AV Scanner detection for dropped file 23->54 56 Machine Learning detection for dropped file 23->56 58 4 other signatures 23->58 30 mscorsvw.exe 23->30         started        process11 signatures12 68 Detected AZORult Info Stealer 30->68 33 WerFault.exe 23 9 30->33         started        process13 dnsIp14 40 192.168.2.1 unknown unknown 33->40
Threat name:
ByteCode-MSIL.Infostealer.Stimilina
Status:
Malicious
First seen:
2020-10-12 15:44:29 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
trojan infostealer family:azorult
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Program crash
Suspicious use of SetThreadContext
Drops startup file
Loads dropped DLL
Executes dropped EXE
Azorult
Malware Config
C2 Extraction:
http://pilsans.com/mxnjs/index.php
Unpacked files
SH256 hash:
caf1aeb2835afd01b7ddc5218ab7b3bfeae4c21dffc0c37111fe3238228791ea
MD5 hash:
4294e8f4beb04035a9427305e0a98ea0
SHA1 hash:
67de77276772fa812d25dcf30518178f4ab8b28c
SH256 hash:
4f690f3cf792f24a571f09740cf25d0979bde8c11180a26864056643c30479cd
MD5 hash:
304cc4a1948539064cfec5b70bd83e21
SHA1 hash:
32b3754f52323fd71b8349f01c9dd4bc4fecd880
SH256 hash:
1c91b0dfca665d00929f7496ef2be63ae24cf9b99494ce9ab77a5dab09abd0b1
MD5 hash:
4764cfc4b2e0b626ee0a6bf139c7e1f5
SHA1 hash:
c834ef2ab559f0d2b0ebbdd7232c48bae0b84592
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
542282ed737d2cb55e3cb59d05e58e8dbf6473d63461194a9ba597f0f3eb5d75
MD5 hash:
0ab09caf48c9dcbcbd53aef80493abd2
SHA1 hash:
fd985c8ed98d443fde035be26592b92662b9c5ea
SH256 hash:
9790a6aa3d28d77d320c8f32938122c1212b7f6291daa7511f854a3fcd0fb037
MD5 hash:
6e53bc3c0364eefd1d448d25e026975d
SHA1 hash:
f11ea87b0638531f442b113feb19dbaae81ad518
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:Trojan_W32_Gh0stMiancha_1_0_0
Rule name:win_azorult_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:win_azorult_g1
Author:Slavo Greminger, SWITCH-CERT

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AZORult

Executable exe caf1aeb2835afd01b7ddc5218ab7b3bfeae4c21dffc0c37111fe3238228791ea

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments