General

  • Target

    1087dc61f973f13367ea32ba9ac5e3f9_JaffaCakes118

  • Size

    7.3MB

  • Sample

    240503-psdgzsed8z

  • MD5

    1087dc61f973f13367ea32ba9ac5e3f9

  • SHA1

    6acb488bb5a8c1ad597988ee6f3ef6dc1e104aaf

  • SHA256

    1dd2a8cfc0af9463edcdbd0ec6d78b8a9253b9e8c964543dcc2f5be9883a11de

  • SHA512

    209b514840f4105acd72f54e010759f807aa532f99fc9b92e3c77b992bd64ff6bda5b022e6b51f2fa275b96205ee6d215cd2f012754dfbb43b0a236a50d51220

  • SSDEEP

    196608:kYjLO64m7a5lii3/vxlC7LmaNzsZbfi4r0OK1TndtMD2c0BK+HZYw:NS64IaTicvxlC7bNg1nQR56D2cYd

Malware Config

Extracted

Family

azorult

C2

http://loqiworou7213.icu/index.php

Targets

    • Target

      1087dc61f973f13367ea32ba9ac5e3f9_JaffaCakes118

    • Size

      7.3MB

    • MD5

      1087dc61f973f13367ea32ba9ac5e3f9

    • SHA1

      6acb488bb5a8c1ad597988ee6f3ef6dc1e104aaf

    • SHA256

      1dd2a8cfc0af9463edcdbd0ec6d78b8a9253b9e8c964543dcc2f5be9883a11de

    • SHA512

      209b514840f4105acd72f54e010759f807aa532f99fc9b92e3c77b992bd64ff6bda5b022e6b51f2fa275b96205ee6d215cd2f012754dfbb43b0a236a50d51220

    • SSDEEP

      196608:kYjLO64m7a5lii3/vxlC7LmaNzsZbfi4r0OK1TndtMD2c0BK+HZYw:NS64IaTicvxlC7bNg1nQR56D2cYd

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks