General

  • Target

    394e34fda29c278b412e10ba43c120fb_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240512-kyy9eshb2y

  • MD5

    394e34fda29c278b412e10ba43c120fb

  • SHA1

    2f8870e215efd1b623568d21a96bef488945b438

  • SHA256

    56dd2710c7ec6a6a947409876cf8d1d5415c4e927d99ef4681246c5592a36ca0

  • SHA512

    ddc1b8baec96a7fc211c7f6f203681d53b59211a3c8b1402fc46ed57508694f40309d19a25280b7ba641a62148a3bfc746c893c185af2e64b2f3e4c48143fc2b

  • SSDEEP

    24576:Tu6J33O0c+JY5UZ+XC0kGso6FasuxZHhuKHkOfqtWrSheMNWY:9u0c++OCvkGs9FasA4Of2WrSYY

Malware Config

Extracted

Family

azorult

C2

http://cn14297.tmweb.ru/index.php

Targets

    • Target

      394e34fda29c278b412e10ba43c120fb_JaffaCakes118

    • Size

      1.2MB

    • MD5

      394e34fda29c278b412e10ba43c120fb

    • SHA1

      2f8870e215efd1b623568d21a96bef488945b438

    • SHA256

      56dd2710c7ec6a6a947409876cf8d1d5415c4e927d99ef4681246c5592a36ca0

    • SHA512

      ddc1b8baec96a7fc211c7f6f203681d53b59211a3c8b1402fc46ed57508694f40309d19a25280b7ba641a62148a3bfc746c893c185af2e64b2f3e4c48143fc2b

    • SSDEEP

      24576:Tu6J33O0c+JY5UZ+XC0kGso6FasuxZHhuKHkOfqtWrSheMNWY:9u0c++OCvkGs9FasA4Of2WrSYY

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks