General

  • Target

    413fddd053097d6a39bd7409da6e9f30_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240514-m3v4nsdc24

  • MD5

    413fddd053097d6a39bd7409da6e9f30

  • SHA1

    b9e71233920023a61af95c6254a3dc76b9c85a75

  • SHA256

    c873e9cdbec94411027fe1a4c8dbb6046ec5ca13ef9b0d1c0b070147a3576313

  • SHA512

    7497040ca9287c9b168295ad3dd228b3e4ec2d4737f08e35a684b5e9365a8de55d890b8f45ba090e7c8ca370b7adc26c01f21706a80566f801f522b9e7be56d3

  • SSDEEP

    24576:Xw2O9/TgwrSUhVPHahmorI0hnvUwLS4/evnsq82IiemR:A95cwOI0ZhxevnsNQx

Malware Config

Extracted

Family

azorult

C2

http://romegeek.xyz/index.php

Targets

    • Target

      413fddd053097d6a39bd7409da6e9f30_JaffaCakes118

    • Size

      1.7MB

    • MD5

      413fddd053097d6a39bd7409da6e9f30

    • SHA1

      b9e71233920023a61af95c6254a3dc76b9c85a75

    • SHA256

      c873e9cdbec94411027fe1a4c8dbb6046ec5ca13ef9b0d1c0b070147a3576313

    • SHA512

      7497040ca9287c9b168295ad3dd228b3e4ec2d4737f08e35a684b5e9365a8de55d890b8f45ba090e7c8ca370b7adc26c01f21706a80566f801f522b9e7be56d3

    • SSDEEP

      24576:Xw2O9/TgwrSUhVPHahmorI0hnvUwLS4/evnsq82IiemR:A95cwOI0ZhxevnsNQx

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks