General

  • Target

    4ee7dc7527d02ec2297d576f54342c7f_JaffaCakes118

  • Size

    707KB

  • Sample

    240517-hsvb6seh77

  • MD5

    4ee7dc7527d02ec2297d576f54342c7f

  • SHA1

    2b7b78c9d57514267d994b9bedb3518a5e473506

  • SHA256

    09981f1a1ee710b22755868112d23dbc5d39b5f342e373ac745361c521cb8408

  • SHA512

    5a80f340f92c880ef6cf1d93a437b8714de8e5592b6df8eaac4d6a1f9718e86ca99a822accd15613cd8d0d743fd37447a365cf0188e6da287962c8a802244568

  • SSDEEP

    12288:VqRX2MgkfrQUJTcCF3I/w5JtTd03NgBmr93dzXndpJA+nmbjjY07MbnXhf39U6OA:IXgY7TNF3IcJz099RXdXmPhAbF39UOXL

Malware Config

Extracted

Family

azorult

C2

http://193.56.28.129/goml/Panel6/index.php

Targets

    • Target

      Ori.exe

    • Size

      762KB

    • MD5

      01b08c6b7dca5f924c2e5140714d3b4b

    • SHA1

      d2a308971cf50f167b4ce0c870ad5c0cca9f8328

    • SHA256

      5f47515e5b289f508e50eefb816dfae7697cb1f0519cba4c6369214beab11af5

    • SHA512

      48b52e25f5c5e5b14e4dbbe70281dcc84d849cfdeb40f49e840b6b082a93e1f01449800f83984311469df66ace4f6b84a858dc3e2cecdef6a50d41ec8dd7e904

    • SSDEEP

      12288:iK2mhAMJ/cPl6BS+ZqUJTcCFBIVw5JtDd03NgzmrV3klrreJA+LmbdjY07+bn1hK:D2O/GluZ5TNFBImJn09d0wmxhKbH3rUB

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks