MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fbdab036a6cde0e46c189586cd276056f0d50a1e7230f8643f2ba670462c4209. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AZORult


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 1 File information Comments

SHA256 hash: fbdab036a6cde0e46c189586cd276056f0d50a1e7230f8643f2ba670462c4209
SHA3-384 hash: 48254e51fb830ffcf7c0034b250530718417cd1208e00c0b0251203108af1c094e303c633f268777abaa6340a8983dbb
SHA1 hash: 76a3069eafe3d88347af15792aba12787f1618e3
MD5 hash: 748cdfed0d65f0c28a3538694317fa88
humanhash: six-robin-violet-twenty
File name:ORDER.exe
Download: download sample
Signature AZORult
File size:682'496 bytes
First seen:2021-04-15 17:51:13 UTC
Last seen:2021-04-15 18:54:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'750 x AgentTesla, 19'653 x Formbook, 12'248 x SnakeKeylogger)
ssdeep 12288:o9Gt3JTsF/X8ougL3uno7Hp3JXeIc25Fb750u+AXjJSy42Uw:WGdJTeU6LGIH1J/c2ff5x+QSflw
Threatray 910 similar samples on MalwareBazaar
TLSH 2CE4F1206A8CFB8AC82D87F2D8A099B013735723D35AD61FD84D20DD5AB5382F55D3A7
Reporter abuse_ch
Tags:AZORult exe


Avatar
abuse_ch
AZORult C2:
http://149.28.226.192/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://149.28.226.192/index.php https://threatfox.abuse.ch/ioc/8613/

Intelligence


File Origin
# of uploads :
2
# of downloads :
231
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ORDER.exe
Verdict:
Malicious activity
Analysis date:
2021-04-15 05:53:22 UTC
Tags:
trojan rat azorult

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
Sending an HTTP POST request
Creating a file in the %temp% subdirectories
Deleting a recently created file
Reading critical registry keys
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AZORult
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Detected AZORult Info Stealer
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected Azorult
Yara detected Azorult Info Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-04-14 17:41:56 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
azorult
Score:
  10/10
Tags:
family:azorult discovery infostealer spyware stealer trojan
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads data files stored by FTP clients
Reads local data of messenger clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Azorult
Malware Config
C2 Extraction:
http://149.28.226.192/index.php
Unpacked files
SH256 hash:
f259795d8be30bc1afb70a28785cce9cde0ce24d2dd259d5ac5a0e69df035776
MD5 hash:
92676a6c07f33f7b7e43cb4aeca288a8
SHA1 hash:
b0cc4d1550834ec4b502222751c508ba73e0b36c
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
fdccaed76f7279e6b8cc1579dadeed03fa1b8d1adcdfbcac585a68da168366d5
MD5 hash:
8b603b23caf00139206f293eb741a9f0
SHA1 hash:
1cc90aec7ce07b13930fe0c088fe3cd155b3ea07
SH256 hash:
81d853cff6c0a608fe3bc2cb1caa8b774f18b5727c45e51c54a9f31e8319c139
MD5 hash:
f15c4aef75c3edd45af4a7ba3235749f
SHA1 hash:
05939b7d0f842e422727480074b943c2e71eb36f
SH256 hash:
fbdab036a6cde0e46c189586cd276056f0d50a1e7230f8643f2ba670462c4209
MD5 hash:
748cdfed0d65f0c28a3538694317fa88
SHA1 hash:
76a3069eafe3d88347af15792aba12787f1618e3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments