General

  • Target

    7fb874ad62ca9d8b708820e5bff41143_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240402-brzryadb22

  • MD5

    7fb874ad62ca9d8b708820e5bff41143

  • SHA1

    401dd7cb672472a2629bc7e1f5bf0bdec979bd70

  • SHA256

    b7faff42bd8ff4aa83a81bc6a800b11802a7a8a76858dbc9ebcef72dad744913

  • SHA512

    ee9d05f6ffc7833aa97140a6b81906369d5807456391cb23510b1585da771d4e05fdbac0589d4dce874bab893c0cc8bb4e0e8a774aca4a0e0878ba2c40370193

  • SSDEEP

    24576:MTjWDWFOBBH5W/LRJAPBEml0qW/4TW65Kls4:MHQBBH5W/LAPHPW/4TW65KS

Malware Config

Extracted

Family

azorult

C2

https://squerad.com/gold/index.php

Targets

    • Target

      7fb874ad62ca9d8b708820e5bff41143_JaffaCakes118

    • Size

      1.1MB

    • MD5

      7fb874ad62ca9d8b708820e5bff41143

    • SHA1

      401dd7cb672472a2629bc7e1f5bf0bdec979bd70

    • SHA256

      b7faff42bd8ff4aa83a81bc6a800b11802a7a8a76858dbc9ebcef72dad744913

    • SHA512

      ee9d05f6ffc7833aa97140a6b81906369d5807456391cb23510b1585da771d4e05fdbac0589d4dce874bab893c0cc8bb4e0e8a774aca4a0e0878ba2c40370193

    • SSDEEP

      24576:MTjWDWFOBBH5W/LRJAPBEml0qW/4TW65Kls4:MHQBBH5W/LAPHPW/4TW65KS

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks