General
-
Target
3f3bab33e1aad1195b30019406f001ee_JaffaCakes118
-
Size
1.1MB
-
Sample
240513-ngyhcacb5x
-
MD5
3f3bab33e1aad1195b30019406f001ee
-
SHA1
b3191b6f7031f3afbe87aca869f5a16fd629abbb
-
SHA256
7bceb7350f8e179276ea8f8fb074631bfb8525a6508138fb9dda526deb820636
-
SHA512
11836591be2376d000e9a5bb61c46105eb7e6d64529affd09e49178944bc6e682f8d37a7088d8ec45714e00a28bb9026049a17f65e236f3b6bed0424d0479b42
-
SSDEEP
24576:AKDXVpmPIXFp+A7pLHraLazXVpmPIXFpK+:ZVgPIXF/9La+rVgPIXFb
Static task
static1
Behavioral task
behavioral1
Sample
3f3bab33e1aad1195b30019406f001ee_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3f3bab33e1aad1195b30019406f001ee_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
azorult
http://cantecme.xyz/aliandsimbi/index.php
Targets
-
-
Target
3f3bab33e1aad1195b30019406f001ee_JaffaCakes118
-
Size
1.1MB
-
MD5
3f3bab33e1aad1195b30019406f001ee
-
SHA1
b3191b6f7031f3afbe87aca869f5a16fd629abbb
-
SHA256
7bceb7350f8e179276ea8f8fb074631bfb8525a6508138fb9dda526deb820636
-
SHA512
11836591be2376d000e9a5bb61c46105eb7e6d64529affd09e49178944bc6e682f8d37a7088d8ec45714e00a28bb9026049a17f65e236f3b6bed0424d0479b42
-
SSDEEP
24576:AKDXVpmPIXFp+A7pLHraLazXVpmPIXFpK+:ZVgPIXF/9La+rVgPIXFb
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-