General

  • Target

    39c368074a4380b85e3291d787f7562f_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240512-m4v53aca7z

  • MD5

    39c368074a4380b85e3291d787f7562f

  • SHA1

    82c8e32c6f3e8ab032d28c893495254562a7c8fd

  • SHA256

    c4d194e400f2ea4c7df3b8d392c8b4fcb2868e1bddf2445e83c6baa2fe6524c6

  • SHA512

    9ac0fa86cffec8afaa93ba65c467cb32043a75a2a8c36fc6a24f28a5db000caa143efd418924ffa6670ed16533b5fd9766002f765dd485b8d85050088f6256f5

  • SSDEEP

    98304:1AI+RTAf+MzQSioq96WMb3O6pLve2WX69t6S9I+H:mtbMZq9666pLvejX06SOM

Malware Config

Extracted

Family

azorult

C2

http://92.63.192.72/index.php

Targets

    • Target

      39c368074a4380b85e3291d787f7562f_JaffaCakes118

    • Size

      3.3MB

    • MD5

      39c368074a4380b85e3291d787f7562f

    • SHA1

      82c8e32c6f3e8ab032d28c893495254562a7c8fd

    • SHA256

      c4d194e400f2ea4c7df3b8d392c8b4fcb2868e1bddf2445e83c6baa2fe6524c6

    • SHA512

      9ac0fa86cffec8afaa93ba65c467cb32043a75a2a8c36fc6a24f28a5db000caa143efd418924ffa6670ed16533b5fd9766002f765dd485b8d85050088f6256f5

    • SSDEEP

      98304:1AI+RTAf+MzQSioq96WMb3O6pLve2WX69t6S9I+H:mtbMZq9666pLvejX06SOM

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks