General

  • Target

    ed8511aa9b1b5c225a6a24dcc1c36e13_JaffaCakes118

  • Size

    969KB

  • Sample

    240411-qnfxzsfe5w

  • MD5

    ed8511aa9b1b5c225a6a24dcc1c36e13

  • SHA1

    5ad13c01039a3e4f6826b017fc3dfb43fbf74812

  • SHA256

    65e3a9d0eb8768505efa40c73de9c5a1e9b98a845fb72e51454e47a83f9a2698

  • SHA512

    bcd546d5784905d4ef531bfa64265d132e28b2cbf5d7672cf29a05523221d920a4ea5be47c7992d31c2cd82fb667b9810111eaccbfaf6162ead1681cac0f9f6e

  • SSDEEP

    24576:5EdZ+tSpotEOwX3vEh65V3UPAFmSID0MEQ7zRtm1bGvyJT5W:iMSp8o38Q5V3ULSE0MbXRtMTI

Malware Config

Extracted

Family

azorult

C2

https://livdecor.pt/work/Panel/index.php

Targets

    • Target

      ed8511aa9b1b5c225a6a24dcc1c36e13_JaffaCakes118

    • Size

      969KB

    • MD5

      ed8511aa9b1b5c225a6a24dcc1c36e13

    • SHA1

      5ad13c01039a3e4f6826b017fc3dfb43fbf74812

    • SHA256

      65e3a9d0eb8768505efa40c73de9c5a1e9b98a845fb72e51454e47a83f9a2698

    • SHA512

      bcd546d5784905d4ef531bfa64265d132e28b2cbf5d7672cf29a05523221d920a4ea5be47c7992d31c2cd82fb667b9810111eaccbfaf6162ead1681cac0f9f6e

    • SSDEEP

      24576:5EdZ+tSpotEOwX3vEh65V3UPAFmSID0MEQ7zRtm1bGvyJT5W:iMSp8o38Q5V3ULSE0MbXRtMTI

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Tasks