General

  • Target

    3f3bab33e1aad1195b30019406f001ee_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240513-ngyhcacb5x

  • MD5

    3f3bab33e1aad1195b30019406f001ee

  • SHA1

    b3191b6f7031f3afbe87aca869f5a16fd629abbb

  • SHA256

    7bceb7350f8e179276ea8f8fb074631bfb8525a6508138fb9dda526deb820636

  • SHA512

    11836591be2376d000e9a5bb61c46105eb7e6d64529affd09e49178944bc6e682f8d37a7088d8ec45714e00a28bb9026049a17f65e236f3b6bed0424d0479b42

  • SSDEEP

    24576:AKDXVpmPIXFp+A7pLHraLazXVpmPIXFpK+:ZVgPIXF/9La+rVgPIXFb

Malware Config

Extracted

Family

azorult

C2

http://cantecme.xyz/aliandsimbi/index.php

Targets

    • Target

      3f3bab33e1aad1195b30019406f001ee_JaffaCakes118

    • Size

      1.1MB

    • MD5

      3f3bab33e1aad1195b30019406f001ee

    • SHA1

      b3191b6f7031f3afbe87aca869f5a16fd629abbb

    • SHA256

      7bceb7350f8e179276ea8f8fb074631bfb8525a6508138fb9dda526deb820636

    • SHA512

      11836591be2376d000e9a5bb61c46105eb7e6d64529affd09e49178944bc6e682f8d37a7088d8ec45714e00a28bb9026049a17f65e236f3b6bed0424d0479b42

    • SSDEEP

      24576:AKDXVpmPIXFp+A7pLHraLazXVpmPIXFpK+:ZVgPIXF/9La+rVgPIXFb

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks