MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d8eb6d3fe02a890173827c242182acd22aa699e4bbd918fd22b95c00aa3a6445. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 1 File information Comments

SHA256 hash: d8eb6d3fe02a890173827c242182acd22aa699e4bbd918fd22b95c00aa3a6445
SHA3-384 hash: 94b8b301119db77720298f06e358fdc954e0aa138b232627f543d3e66734cdf5db6870d203621e68f1ad7a5780497ff4
SHA1 hash: 135c63fbf3659951888c74dde12df75575664eca
MD5 hash: c0facaa9561e361afe9d92d38e2793a0
humanhash: cat-lactose-lamp-lamp
File name:C0FACAA9561E361AFE9D92D38E2793A0.exe
Download: download sample
Signature AZORult
File size:1'110'016 bytes
First seen:2021-08-24 23:41:34 UTC
Last seen:2021-08-25 01:23:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ca357d1c9b605d95e9d31e67e1c53033 (6 x AZORult, 2 x RaccoonStealer, 1 x NetWire)
ssdeep 24576:nqqPzCBX6k4NCC0pOVXPbhH4DZ0XscH93EyLvWvfwi4Zm3:nqqGkRkCNFhH4DZ08cH93EyzwolZi
Threatray 6'896 similar samples on MalwareBazaar
TLSH T10F35120654B44DA2F05A0AB51AE2C9F44B3BEC2351529D0B7786BE0A19B3BD77CC0B77
dhash icon 0fbefea4adf2c2c0 (2 x AZORult)
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://185.234.247.35/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.234.247.35/ https://threatfox.abuse.ch/ioc/193640/

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'305
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C0FACAA9561E361AFE9D92D38E2793A0.exe
Verdict:
Malicious activity
Analysis date:
2021-08-24 23:44:18 UTC
Tags:
loader trojan stealer vidar rat azorult raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Azorult Raccoon
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Raccoon Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 471082 Sample: 0H2Z13Af7G.exe Startdate: 25/08/2021 Architecture: WINDOWS Score: 100 51 partadino.ac.ug 2->51 53 markinda.xyz 2->53 55 3 other IPs or domains 2->55 63 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->63 65 Multi AV Scanner detection for domain / URL 2->65 67 Found malware configuration 2->67 69 14 other signatures 2->69 10 0H2Z13Af7G.exe 15 2->10         started        signatures3 process4 file5 49 C:\Users\user\AppData\Local\...\vctuacx.exe, PE32 10->49 dropped 79 Maps a DLL or memory area into another process 10->79 14 vctuacx.exe 4 10->14         started        17 0H2Z13Af7G.exe 2 10->17         started        signatures6 process7 file8 81 Antivirus detection for dropped file 14->81 83 Multi AV Scanner detection for dropped file 14->83 85 Machine Learning detection for dropped file 14->85 87 Maps a DLL or memory area into another process 14->87 20 vctuacx.exe 21 14->20         started        35 C:\Users\user\AppData\Local\...\bassmod.dll, PE32 17->35 dropped signatures9 process10 dnsIp11 57 gordons.ac.ug 185.215.113.77, 49704, 49707, 49712 WHOLESALECONNECTIONSNL Portugal 20->57 59 tuekisa.ac.ug 20->59 61 11 other IPs or domains 20->61 37 C:\Users\user\AppData\Local\...\Dropkxa.exe, PE32 20->37 dropped 39 C:\Users\user\AppData\Local\...\Dropakxa.exe, PE32 20->39 dropped 41 C:\Users\user\AppData\Local\...\ghjk[1].exe, PE32 20->41 dropped 43 C:\Users\user\AppData\Local\...\ghjkl[1].exe, PE32 20->43 dropped 24 Dropakxa.exe 7 20->24         started        28 Dropkxa.exe 2 20->28         started        file12 process13 file14 45 C:\Users\user\AppData\...behaviorgraphFytrnvbas.exe, PE32 24->45 dropped 47 C:\Users\user\AppData\...behaviorgraphFsewerhgccbv.exe, PE32 24->47 dropped 71 Antivirus detection for dropped file 24->71 73 Multi AV Scanner detection for dropped file 24->73 75 Machine Learning detection for dropped file 24->75 77 2 other signatures 24->77 30 GFsewerhgccbv.exe 4 24->30         started        33 GFytrnvbas.exe 4 24->33         started        signatures15 process16 signatures17 89 Antivirus detection for dropped file 30->89 91 Multi AV Scanner detection for dropped file 30->91 93 Machine Learning detection for dropped file 30->93 95 2 other signatures 30->95
Threat name:
Win32.Trojan.Remcos
Status:
Malicious
First seen:
2021-08-21 15:26:44 UTC
AV detection:
28 of 46 (60.87%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:azorult family:oski family:raccoon botnet:c81fb6015c832710f869f6911e1aec18747e0184 discovery infostealer spyware stealer suricata trojan upx
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Azorult
Oski
Raccoon
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M16
suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M3
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
hsagoi.ac.ug
Unpacked files
SH256 hash:
a0e90f8e9abcbc950616a8752dabd4782553e700e1961a048b928184fd507a0c
MD5 hash:
3fc9b2cb7b70ff60db5682572766a1cc
SHA1 hash:
6e85156e1d7dae37cd90ad2ab6345d4c098dd7e5
SH256 hash:
95b94a7a06b6cd5734013ef7ebb9f9cea6d04f7f467fffa203a09a8e6d5ff0d3
MD5 hash:
5acd21381d600765601be0e4e7b6597a
SHA1 hash:
879cec8513536dfb7a2b562e05893bbf0ef6f5ee
SH256 hash:
566934a049ae41fe36e2e122825875e5c02d4db083e744a7a3c94f456cec2f94
MD5 hash:
e3a6587ba5a4ee4514ecaa4265dd9b2c
SHA1 hash:
b44bb9b5fc3478fa6ea5140603857ee0c2d4c4fd
SH256 hash:
b46ec9ea62d8b5c3900f310d581773f5679807e25272c35af013025b0746a613
MD5 hash:
c02c5fc3c192f1110df281081b6c2cd2
SHA1 hash:
f77470eead0b455e7d6dc9831a962d24d99e5af9
SH256 hash:
deb7126d126a329eecf5233f2665124f149b881ce349680520f00350448a3ef4
MD5 hash:
995651506876321dc5936ae619a6a37e
SHA1 hash:
4720448dc58a30f8f8b925b98f8fd85279cf861d
SH256 hash:
d8eb6d3fe02a890173827c242182acd22aa699e4bbd918fd22b95c00aa3a6445
MD5 hash:
c0facaa9561e361afe9d92d38e2793a0
SHA1 hash:
135c63fbf3659951888c74dde12df75575664eca
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Meteorite
Author:ditekSHen
Description:Detects Meteorite downloader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments