General

  • Target

    54b1ee633e49544e5bb6099dd576663e_JaffaCakes118

  • Size

    420KB

  • Sample

    240518-pjl3rsbc86

  • MD5

    54b1ee633e49544e5bb6099dd576663e

  • SHA1

    0c844bf459777740a4d7fa71510da4d5d6ee1530

  • SHA256

    2bdf9811d9fdc64acc21f88900c8f8054c900c009a98bb1efed40f64be259115

  • SHA512

    2c0bfebd90c434f5b710eb27d2833f0c3010a6c301b8941de825e44d8a2420c53d086d794e39a9d3bbeca450111f59fd6e59895694552a8ee23adcadad0531ac

  • SSDEEP

    6144:Ft7UUAVmnPbDLl9QsHvcrEi78gJ9KEXV4/lX:rUUEmXLl9QsGQE9KEFml

Malware Config

Extracted

Family

azorult

C2

http://gebbatrip.club/index.php

Targets

    • Target

      54b1ee633e49544e5bb6099dd576663e_JaffaCakes118

    • Size

      420KB

    • MD5

      54b1ee633e49544e5bb6099dd576663e

    • SHA1

      0c844bf459777740a4d7fa71510da4d5d6ee1530

    • SHA256

      2bdf9811d9fdc64acc21f88900c8f8054c900c009a98bb1efed40f64be259115

    • SHA512

      2c0bfebd90c434f5b710eb27d2833f0c3010a6c301b8941de825e44d8a2420c53d086d794e39a9d3bbeca450111f59fd6e59895694552a8ee23adcadad0531ac

    • SSDEEP

      6144:Ft7UUAVmnPbDLl9QsHvcrEi78gJ9KEXV4/lX:rUUEmXLl9QsGQE9KEFml

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks