General

  • Target

    36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118

  • Size

    6.9MB

  • Sample

    240511-yxme5aaa29

  • MD5

    36558a5968ee5e507796e0b6b2bf13c2

  • SHA1

    8dc1964e9e34ed52d783619929339759a728fdc0

  • SHA256

    24ab0e78ae8e2bd60d98a4e5e0af73a011ff3160151ae1e5510f49097cafaf21

  • SHA512

    47a238da02c82f78a38083b6cd3b7055607291933a7691db700d38b2d36f70226e69df4175603625dd33b46fb3f87b0af45c09842beca76cce67a3ebe5582de5

  • SSDEEP

    98304:iXR+907BLTQWQoB363zrCTN5FA1PubwpkPIUm1dvE9Sp4debNnPQI+DorDWqyncj:mRnN7qHCR5FCPubqkQh/EJLvnh

Malware Config

Extracted

Family

azorult

C2

http://51.15.126.138/8B4296D7-D3D3-4556-A73B-D4EA909600B7/index.php

Targets

    • Target

      36558a5968ee5e507796e0b6b2bf13c2_JaffaCakes118

    • Size

      6.9MB

    • MD5

      36558a5968ee5e507796e0b6b2bf13c2

    • SHA1

      8dc1964e9e34ed52d783619929339759a728fdc0

    • SHA256

      24ab0e78ae8e2bd60d98a4e5e0af73a011ff3160151ae1e5510f49097cafaf21

    • SHA512

      47a238da02c82f78a38083b6cd3b7055607291933a7691db700d38b2d36f70226e69df4175603625dd33b46fb3f87b0af45c09842beca76cce67a3ebe5582de5

    • SSDEEP

      98304:iXR+907BLTQWQoB363zrCTN5FA1PubwpkPIUm1dvE9Sp4debNnPQI+DorDWqyncj:mRnN7qHCR5FCPubqkQh/EJLvnh

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks