General

  • Target

    e9a4486c0078c29fee65ef16de2c0cd5_JaffaCakes118

  • Size

    841KB

  • Sample

    240409-k319ksef51

  • MD5

    e9a4486c0078c29fee65ef16de2c0cd5

  • SHA1

    27d5b85016b2db545fafc4b4c4efdceaa71c7b94

  • SHA256

    fa64fcd9e47e42fcfb3940675375ef93d74d253c348d16bb4284b60ed59d3dac

  • SHA512

    10392899ed338aa6e50f8b115c8ba50cdfd1cff7d2099faa0ae7608eb1b690ed5774e7dce55197b88cb2d321a01a3ecf795ddeccd681519656b21cb8477bbd64

  • SSDEEP

    12288:viprCsnWTd5XmM7qW+/w590DMTkdLC1BRA/eR6Yg/nFqq89N:mDnAdcUqW+e9FEL7rYyMZ9N

Malware Config

Extracted

Family

azorult

C2

http://xtream-ui.tk/bvLOI/index.php

Targets

    • Target

      e9a4486c0078c29fee65ef16de2c0cd5_JaffaCakes118

    • Size

      841KB

    • MD5

      e9a4486c0078c29fee65ef16de2c0cd5

    • SHA1

      27d5b85016b2db545fafc4b4c4efdceaa71c7b94

    • SHA256

      fa64fcd9e47e42fcfb3940675375ef93d74d253c348d16bb4284b60ed59d3dac

    • SHA512

      10392899ed338aa6e50f8b115c8ba50cdfd1cff7d2099faa0ae7608eb1b690ed5774e7dce55197b88cb2d321a01a3ecf795ddeccd681519656b21cb8477bbd64

    • SSDEEP

      12288:viprCsnWTd5XmM7qW+/w590DMTkdLC1BRA/eR6Yg/nFqq89N:mDnAdcUqW+e9FEL7rYyMZ9N

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks