Advertisement
paladin316

1709AZORult_cc66a26a855d294b0f3817447fcb8246_exe_2019-09-12_20_30.txt

Sep 12th, 2019
1,641
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.61 KB | None | 0 0
  1.  
  2. * ID: 1709
  3. * MalFamily: "Azorult"
  4.  
  5. * MalScore: 10.0
  6.  
  7. * File Name: "AZORult_cc66a26a855d294b0f3817447fcb8246.exe"
  8. * File Size: 658432
  9. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  10. * SHA256: "85c886e2039791f85fdf3e9fe0e770f13ec0f7c0329fd6169f4c5d8e4539b219"
  11. * MD5: "cc66a26a855d294b0f3817447fcb8246"
  12. * SHA1: "cd484a064328515c0d51d4869788b6f4db553399"
  13. * SHA512: "053cf6636bdcb330fa218646dc27d9027324abaf8179a3b18870dbb90f83fffa2c2ad7e4bc6e121721243201bfcb23d04f3b3d892f67d7775bdff497e4884d8a"
  14. * CRC32: "2F21D793"
  15. * SSDEEP: "12288:zXaqBTC3kEFwmZZnbkEg5DD8LyTsEgc6dzTEb3N:zXpTNEumZZnbkEg5DD8uT5Id3a"
  16.  
  17. * Process Execution:
  18. "1zfFyuGmqgN.exe"
  19.  
  20.  
  21. * Executed Commands:
  22.  
  23. * Signatures Detected:
  24.  
  25. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  26. "Details":
  27.  
  28.  
  29. "Description": "Behavioural detection: Executable code extraction",
  30. "Details":
  31.  
  32.  
  33. "Description": "Possible date expiration check, exits too soon after checking local time",
  34. "Details":
  35.  
  36. "process": "1zfFyuGmqgN.exe, PID 3876"
  37.  
  38.  
  39.  
  40.  
  41. "Description": "Performs HTTP requests potentially not found in PCAP.",
  42. "Details":
  43.  
  44. "url_ioc": "bruxara.com:80//index.php"
  45.  
  46.  
  47.  
  48.  
  49. "Description": "CAPE detected the Azorult malware family",
  50. "Details":
  51.  
  52.  
  53. "Description": "File has been identified by 22 Antiviruses on VirusTotal as malicious",
  54. "Details":
  55.  
  56. "MicroWorld-eScan": "Gen:Variant.Fugrafa.4267"
  57.  
  58.  
  59. "FireEye": "Generic.mg.cc66a26a855d294b"
  60.  
  61.  
  62. "McAfee": "Packed-FVK!CC66A26A855D"
  63.  
  64.  
  65. "Cybereason": "malicious.643285"
  66.  
  67.  
  68. "Arcabit": "Trojan.Fugrafa.D10AB"
  69.  
  70.  
  71. "Symantec": "ML.Attribute.HighConfidence"
  72.  
  73.  
  74. "APEX": "Malicious"
  75.  
  76.  
  77. "BitDefender": "Gen:Variant.Fugrafa.4267"
  78.  
  79.  
  80. "Endgame": "malicious (high confidence)"
  81.  
  82.  
  83. "Emsisoft": "Gen:Variant.Fugrafa.4267 (B)"
  84.  
  85.  
  86. "Comodo": "TrojWare.Win32.Cerber.AV@6ffira"
  87.  
  88.  
  89. "McAfee-GW-Edition": "Packed-FVK!CC66A26A855D"
  90.  
  91.  
  92. "SentinelOne": "DFI - Suspicious PE"
  93.  
  94.  
  95. "GData": "Gen:Variant.Fugrafa.4267"
  96.  
  97.  
  98. "Acronis": "suspicious"
  99.  
  100.  
  101. "VBA32": "BScope.Exploit.Shellcode"
  102.  
  103.  
  104. "ALYac": "Gen:Variant.Fugrafa.4267"
  105.  
  106.  
  107. "MAX": "malware (ai score=81)"
  108.  
  109.  
  110. "Ad-Aware": "Gen:Variant.Fugrafa.4267"
  111.  
  112.  
  113. "ESET-NOD32": "a variant of Win32/Kryptik.GVYE"
  114.  
  115.  
  116. "CrowdStrike": "win/malicious_confidence_90% (W)"
  117.  
  118.  
  119. "Qihoo-360": "HEUR/QVM10.1.D71E.Malware.Gen"
  120.  
  121.  
  122.  
  123.  
  124. "Description": "Collects information to fingerprint the system",
  125. "Details":
  126.  
  127.  
  128.  
  129. * Started Service:
  130.  
  131. * Mutexes:
  132. "Local\\_!MSFTHISTORY!_",
  133. "Local\\c:!users!user!appdata!local!microsoft!windows!temporary internet files!content.ie5!",
  134. "Local\\c:!users!user!appdata!roaming!microsoft!windows!cookies!",
  135. "Local\\c:!users!user!appdata!local!microsoft!windows!history!history.ie5!",
  136. "A81FB8C6-0BBE6E18-6FC9B5DB-536DA455-933946726"
  137.  
  138.  
  139. * Modified Files:
  140. "\\??\\PIPE\\wkssvc",
  141. "\\??\\PIPE\\DAV RPC SERVICE",
  142. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat",
  143. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\index.dat",
  144. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat"
  145.  
  146.  
  147. * Deleted Files:
  148.  
  149. * Modified Registry Keys:
  150. "HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\MediaResources\\msvideo"
  151.  
  152.  
  153. * Deleted Registry Keys:
  154.  
  155. * DNS Communications:
  156.  
  157. "type": "A",
  158. "request": "bruxara.com",
  159. "answers":
  160.  
  161.  
  162.  
  163. * Domains:
  164.  
  165. "ip": "91.211.246.23",
  166. "domain": "bruxara.com"
  167.  
  168.  
  169.  
  170. * Network Communication - ICMP:
  171.  
  172. * Network Communication - HTTP:
  173.  
  174. * Network Communication - SMTP:
  175.  
  176. * Network Communication - Hosts:
  177.  
  178. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement