MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dc9b22b1af973bd12495cfd6e2c6621eb21e347a3f6a32edafb823a91d4e721a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
AZORult
Vendor detections: 5
| SHA256 hash: | dc9b22b1af973bd12495cfd6e2c6621eb21e347a3f6a32edafb823a91d4e721a |
|---|---|
| SHA3-384 hash: | 0be2c012560a918c6d5d93f58dc1d9fbf009d992dc830ff0108eb3197feb04c49c35e6a4f45670c5ea7e9d6b44269b8c |
| SHA1 hash: | dc7d048c579b0a67e1695445e37f19a9e0d7ed84 |
| MD5 hash: | 509a5d2b97c07305a9db34125ba0defb |
| humanhash: | apart-virginia-item-oranges |
| File name: | RFQ_Report_17938_pdf.exe |
| Download: | download sample |
| Signature | AZORult |
| File size: | 758'272 bytes |
| First seen: | 2020-06-04 07:07:35 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e92fa7ccd490db33ccf0235eae4258bb (3 x AgentTesla, 2 x Loki, 1 x HawkEye) |
| ssdeep | 12288:Y6+mn9A32uu5hZqBnxeu5cfM+BIjvTxGKUlOtzz1Lww40n+ij12SC3PaEdP:Y6d97ZMmNgTBJ1oQ9j1eaiP |
| Threatray | 319 similar samples on MalwareBazaar |
| TLSH | 6AF48D22FEA04436C97317399C9B93B49C2ABDE07F24A98637E4DDCC5E346913935293 |
| Reporter | |
| Tags: | AZORult exe |
abuse_ch
Malspam distributing AZORult:HELO: mail.digitalgroup.hu
Sending IP: 188.36.127.74
From: elias.laszlo@industrialeb.hu
Subject: RFQ 17938 FOR REF-1021614
Attachment: RFQ_Report_17938_pdf.zip (contains "RFQ_Report_17938_pdf.exe")
AZORult C2:
http://mblasta.com/china/AZO/index.php
Intelligence
File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-03 23:11:11 UTC
AV detection:
33 of 46 (71.74%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Label(s):
azorult
Similar samples:
+ 309 additional samples on MalwareBazaar
Result
Malware family:
azorult
Score:
10/10
Tags:
family:azorult infostealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Azorult
Malware Config
C2 Extraction:
http://mblasta.com/china/AZO/index.php
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.