General

  • Target

    e5b56eae39779f3376d31190cbdb3996_JaffaCakes118

  • Size

    413KB

  • Sample

    240407-yd1teada26

  • MD5

    e5b56eae39779f3376d31190cbdb3996

  • SHA1

    4e720b50c02cec149e6db86337ea5ec8ad0a0040

  • SHA256

    82b35b0a097d9f49b7f68e6e2cbd3475ffc09dba88b02af5c1942486a8c88204

  • SHA512

    7a47eb5baa2a4bc8f0708814084a115b0d77d3cb7fddd493b6ae1fcb65c41ac08b19653a07360b875a6a3ccfd4f059a25bb0ee5b218775487eebd51bae5fe682

  • SSDEEP

    12288:tGffCXbmXyaS9pv2i+W1Rs6I0nwPUpZlutMO:AXCXbGy7pv2IZOUqv

Malware Config

Extracted

Family

azorult

C2

http://spreadgoodfiles.xyz/XcvU/index.php

Targets

    • Target

      e5b56eae39779f3376d31190cbdb3996_JaffaCakes118

    • Size

      413KB

    • MD5

      e5b56eae39779f3376d31190cbdb3996

    • SHA1

      4e720b50c02cec149e6db86337ea5ec8ad0a0040

    • SHA256

      82b35b0a097d9f49b7f68e6e2cbd3475ffc09dba88b02af5c1942486a8c88204

    • SHA512

      7a47eb5baa2a4bc8f0708814084a115b0d77d3cb7fddd493b6ae1fcb65c41ac08b19653a07360b875a6a3ccfd4f059a25bb0ee5b218775487eebd51bae5fe682

    • SSDEEP

      12288:tGffCXbmXyaS9pv2i+W1Rs6I0nwPUpZlutMO:AXCXbGy7pv2IZOUqv

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks