General
-
Target
1087dc61f973f13367ea32ba9ac5e3f9_JaffaCakes118
-
Size
7.3MB
-
Sample
240503-psdgzsed8z
-
MD5
1087dc61f973f13367ea32ba9ac5e3f9
-
SHA1
6acb488bb5a8c1ad597988ee6f3ef6dc1e104aaf
-
SHA256
1dd2a8cfc0af9463edcdbd0ec6d78b8a9253b9e8c964543dcc2f5be9883a11de
-
SHA512
209b514840f4105acd72f54e010759f807aa532f99fc9b92e3c77b992bd64ff6bda5b022e6b51f2fa275b96205ee6d215cd2f012754dfbb43b0a236a50d51220
-
SSDEEP
196608:kYjLO64m7a5lii3/vxlC7LmaNzsZbfi4r0OK1TndtMD2c0BK+HZYw:NS64IaTicvxlC7bNg1nQR56D2cYd
Behavioral task
behavioral1
Sample
1087dc61f973f13367ea32ba9ac5e3f9_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1087dc61f973f13367ea32ba9ac5e3f9_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
azorult
http://loqiworou7213.icu/index.php
Targets
-
-
Target
1087dc61f973f13367ea32ba9ac5e3f9_JaffaCakes118
-
Size
7.3MB
-
MD5
1087dc61f973f13367ea32ba9ac5e3f9
-
SHA1
6acb488bb5a8c1ad597988ee6f3ef6dc1e104aaf
-
SHA256
1dd2a8cfc0af9463edcdbd0ec6d78b8a9253b9e8c964543dcc2f5be9883a11de
-
SHA512
209b514840f4105acd72f54e010759f807aa532f99fc9b92e3c77b992bd64ff6bda5b022e6b51f2fa275b96205ee6d215cd2f012754dfbb43b0a236a50d51220
-
SSDEEP
196608:kYjLO64m7a5lii3/vxlC7LmaNzsZbfi4r0OK1TndtMD2c0BK+HZYw:NS64IaTicvxlC7bNg1nQR56D2cYd
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-