General
-
Target
1e650fef9a87668cb2c9ef8eafb4eb85_JaffaCakes118
-
Size
1.5MB
-
Sample
240506-z3c93sed93
-
MD5
1e650fef9a87668cb2c9ef8eafb4eb85
-
SHA1
6b5506675dc113e1408f2b082d011aab3d0e17dc
-
SHA256
dca4e2438bf04449b095fc5176cead2662e941d664ad0484b42698826f9c2955
-
SHA512
2e094f36dcfd2116e34235b9fd4668cafbf858857df627148ad9d1b783e3d18adfb01d5b72264c60df014d8f2078d4d9a1909f9e9f0dc09feec85481709befd8
-
SSDEEP
24576:1MmMeEET/2Eln8w2URFVb8RFHJw93tqbjPRhttjkIhVSJ/oPTLLmutauUb9rR+W:SmM+Lr2Uf1tqbNhDOSLLiDu8
Behavioral task
behavioral1
Sample
1e650fef9a87668cb2c9ef8eafb4eb85_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1e650fef9a87668cb2c9ef8eafb4eb85_JaffaCakes118.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
azorult
http://aquavictus.hr/img/Panel/index.php
Extracted
lokibot
http://aquavictus.hr/app/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Targets
-
-
Target
1e650fef9a87668cb2c9ef8eafb4eb85_JaffaCakes118
-
Size
1.5MB
-
MD5
1e650fef9a87668cb2c9ef8eafb4eb85
-
SHA1
6b5506675dc113e1408f2b082d011aab3d0e17dc
-
SHA256
dca4e2438bf04449b095fc5176cead2662e941d664ad0484b42698826f9c2955
-
SHA512
2e094f36dcfd2116e34235b9fd4668cafbf858857df627148ad9d1b783e3d18adfb01d5b72264c60df014d8f2078d4d9a1909f9e9f0dc09feec85481709befd8
-
SSDEEP
24576:1MmMeEET/2Eln8w2URFVb8RFHJw93tqbjPRhttjkIhVSJ/oPTLLmutauUb9rR+W:SmM+Lr2Uf1tqbNhDOSLLiDu8
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-