MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc9b22b1af973bd12495cfd6e2c6621eb21e347a3f6a32edafb823a91d4e721a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: dc9b22b1af973bd12495cfd6e2c6621eb21e347a3f6a32edafb823a91d4e721a
SHA3-384 hash: 0be2c012560a918c6d5d93f58dc1d9fbf009d992dc830ff0108eb3197feb04c49c35e6a4f45670c5ea7e9d6b44269b8c
SHA1 hash: dc7d048c579b0a67e1695445e37f19a9e0d7ed84
MD5 hash: 509a5d2b97c07305a9db34125ba0defb
humanhash: apart-virginia-item-oranges
File name:RFQ_Report_17938_pdf.exe
Download: download sample
Signature AZORult
File size:758'272 bytes
First seen:2020-06-04 07:07:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e92fa7ccd490db33ccf0235eae4258bb (3 x AgentTesla, 2 x Loki, 1 x HawkEye)
ssdeep 12288:Y6+mn9A32uu5hZqBnxeu5cfM+BIjvTxGKUlOtzz1Lww40n+ij12SC3PaEdP:Y6d97ZMmNgTBJ1oQ9j1eaiP
Threatray 319 similar samples on MalwareBazaar
TLSH 6AF48D22FEA04436C97317399C9B93B49C2ABDE07F24A98637E4DDCC5E346913935293
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
Malspam distributing AZORult:

HELO: mail.digitalgroup.hu
Sending IP: 188.36.127.74
From: elias.laszlo@industrialeb.hu
Subject: RFQ 17938 FOR REF-1021614
Attachment: RFQ_Report_17938_pdf.zip (contains "RFQ_Report_17938_pdf.exe")

AZORult C2:
http://mblasta.com/china/AZO/index.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-06-03 23:11:11 UTC
AV detection:
33 of 46 (71.74%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult infostealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Azorult
Malware Config
C2 Extraction:
http://mblasta.com/china/AZO/index.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AZORult

Executable exe dc9b22b1af973bd12495cfd6e2c6621eb21e347a3f6a32edafb823a91d4e721a

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments