General

  • Target

    46afc60c18db5b9f7c12ec3a2e02a8bb_JaffaCakes118

  • Size

    389KB

  • Sample

    240515-sbyy5sed9z

  • MD5

    46afc60c18db5b9f7c12ec3a2e02a8bb

  • SHA1

    7169486f1a997f634527933aa85036bb0f661b80

  • SHA256

    6c9d2c756ec211e2a94a253bb04214d8be64b9f0f767d68bd88ec84d74e273ae

  • SHA512

    b3bc5ca0a2b4cd96de9f837689fbda80a74322544d6534f61380cc81fd532e6a572081a9c9199e014bcfc57a7cc587b660b9f37c133add96b88953645261fd43

  • SSDEEP

    12288:SaKiMGJ3pubiPWUpkPd3QZmrOBo7GMBOLy9kj:SaKFziP/6Pd3NOBKPBOLy9kj

Malware Config

Extracted

Family

azorult

C2

http://207.154.240.23/index.php

Targets

    • Target

      Company profile.exe

    • Size

      714KB

    • MD5

      3af928b8c8ff9993e7567360d26275e6

    • SHA1

      b3a79f4b6fa9f4bcc4c8bab8b6eda8df3b0f0ee0

    • SHA256

      1206ddd174f5df61f70259ac6da12226590232dd5f70d3139aa290d381efecbe

    • SHA512

      9ef73554db5164ec5944b493d555e93182b0945f2f2a6a19e80b7598fe7b65a2f8a1dc4c3a09858683d8c38233af0763f4c68a9a5ff294420ed75b9a59e7ed87

    • SSDEEP

      12288:/cFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOQmT/3iJusPIW6F:lnYnuRcBIoGblBhk/qIX

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks