General
-
Target
413fddd053097d6a39bd7409da6e9f30_JaffaCakes118
-
Size
1.7MB
-
Sample
240514-m3v4nsdc24
-
MD5
413fddd053097d6a39bd7409da6e9f30
-
SHA1
b9e71233920023a61af95c6254a3dc76b9c85a75
-
SHA256
c873e9cdbec94411027fe1a4c8dbb6046ec5ca13ef9b0d1c0b070147a3576313
-
SHA512
7497040ca9287c9b168295ad3dd228b3e4ec2d4737f08e35a684b5e9365a8de55d890b8f45ba090e7c8ca370b7adc26c01f21706a80566f801f522b9e7be56d3
-
SSDEEP
24576:Xw2O9/TgwrSUhVPHahmorI0hnvUwLS4/evnsq82IiemR:A95cwOI0ZhxevnsNQx
Static task
static1
Behavioral task
behavioral1
Sample
413fddd053097d6a39bd7409da6e9f30_JaffaCakes118.ps1
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
413fddd053097d6a39bd7409da6e9f30_JaffaCakes118.ps1
Resource
win10v2004-20240508-en
Malware Config
Extracted
azorult
http://romegeek.xyz/index.php
Targets
-
-
Target
413fddd053097d6a39bd7409da6e9f30_JaffaCakes118
-
Size
1.7MB
-
MD5
413fddd053097d6a39bd7409da6e9f30
-
SHA1
b9e71233920023a61af95c6254a3dc76b9c85a75
-
SHA256
c873e9cdbec94411027fe1a4c8dbb6046ec5ca13ef9b0d1c0b070147a3576313
-
SHA512
7497040ca9287c9b168295ad3dd228b3e4ec2d4737f08e35a684b5e9365a8de55d890b8f45ba090e7c8ca370b7adc26c01f21706a80566f801f522b9e7be56d3
-
SSDEEP
24576:Xw2O9/TgwrSUhVPHahmorI0hnvUwLS4/evnsq82IiemR:A95cwOI0ZhxevnsNQx
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-