Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
492241916d1410755725780bf057b411_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
492241916d1410755725780bf057b411_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
492241916d1410755725780bf057b411_JaffaCakes118.exe
-
Size
618KB
-
MD5
492241916d1410755725780bf057b411
-
SHA1
4b39908f479399fd22cc4b0ea79ee941ce887353
-
SHA256
262f1c4dadec933987054be084175cd9b88774a3d4838c06a6f4a9bf0cb682ab
-
SHA512
28c5e537527dbbaeb948ec0dc14168dce0d8151fe23a436e84cfdf12f786f2fbe2555d99cc8822b54e152ebda234dd66ae15df3626eda4723c17c5a70ec1cffd
-
SSDEEP
12288:94a9SL0NbJFUPBzhNo65MIvaTV408/ipnWIL+BAKCVn:94a9MCJKhNo65im05pnWIbKU
Malware Config
Extracted
azorult
http://guccizone.bit/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Unexpected DNS network traffic destination 14 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 46.101.70.183 Destination IP 94.247.43.254 Destination IP 107.172.42.186 Destination IP 91.217.137.44 Destination IP 130.255.78.223 Destination IP 173.212.234.232 Destination IP 173.249.7.187 Destination IP 151.80.147.153 Destination IP 80.233.248.109 Destination IP 50.3.82.215 Destination IP 82.141.39.32 Destination IP 162.248.241.94 Destination IP 5.45.97.127 Destination IP 128.52.130.209 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2916 492241916d1410755725780bf057b411_JaffaCakes118.exe 2916 492241916d1410755725780bf057b411_JaffaCakes118.exe 2916 492241916d1410755725780bf057b411_JaffaCakes118.exe