General
-
Target
394e34fda29c278b412e10ba43c120fb_JaffaCakes118
-
Size
1.2MB
-
Sample
240512-kyy9eshb2y
-
MD5
394e34fda29c278b412e10ba43c120fb
-
SHA1
2f8870e215efd1b623568d21a96bef488945b438
-
SHA256
56dd2710c7ec6a6a947409876cf8d1d5415c4e927d99ef4681246c5592a36ca0
-
SHA512
ddc1b8baec96a7fc211c7f6f203681d53b59211a3c8b1402fc46ed57508694f40309d19a25280b7ba641a62148a3bfc746c893c185af2e64b2f3e4c48143fc2b
-
SSDEEP
24576:Tu6J33O0c+JY5UZ+XC0kGso6FasuxZHhuKHkOfqtWrSheMNWY:9u0c++OCvkGs9FasA4Of2WrSYY
Static task
static1
Behavioral task
behavioral1
Sample
394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
394e34fda29c278b412e10ba43c120fb_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
azorult
http://cn14297.tmweb.ru/index.php
Targets
-
-
Target
394e34fda29c278b412e10ba43c120fb_JaffaCakes118
-
Size
1.2MB
-
MD5
394e34fda29c278b412e10ba43c120fb
-
SHA1
2f8870e215efd1b623568d21a96bef488945b438
-
SHA256
56dd2710c7ec6a6a947409876cf8d1d5415c4e927d99ef4681246c5592a36ca0
-
SHA512
ddc1b8baec96a7fc211c7f6f203681d53b59211a3c8b1402fc46ed57508694f40309d19a25280b7ba641a62148a3bfc746c893c185af2e64b2f3e4c48143fc2b
-
SSDEEP
24576:Tu6J33O0c+JY5UZ+XC0kGso6FasuxZHhuKHkOfqtWrSheMNWY:9u0c++OCvkGs9FasA4Of2WrSYY
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-