General

  • Target

    578c39aaaef75c50190c36f266de6e53_JaffaCakes118

  • Size

    265KB

  • Sample

    240519-acb7nafd6w

  • MD5

    578c39aaaef75c50190c36f266de6e53

  • SHA1

    f19bdb45e3bece32f47283e0d5e875983bbb0dff

  • SHA256

    ad152c273a9223b942b083ef8225e38f2d6ae2fcc45372495f67f33b1273b18a

  • SHA512

    747b854cfaa889f021789367fc75165fa7d62d9aea1a46897e34532266c65509f88dce1907cb209e1f1617ead52f06e7b44d19679bb7472a3765b619452fe31e

  • SSDEEP

    6144:uQN+e9L1apMgEWX/5l5ZaUIxFKc4NiJSLMJ6:nAe9L1MMgEIRnEjvR40JAMw

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      P0_0l.exe

    • Size

      335KB

    • MD5

      3f6aea2f244894305741f43fb89335ec

    • SHA1

      d7dabf58df01a10296ae1eff20c0d0e08798c9ef

    • SHA256

      2bd0843fd2e789f8c674f05c8fcde655e4daaa6a5a31357073032798c947b584

    • SHA512

      fd012b37090f84a1d209eadebd69fcc3705ec035315d844d0d1fe4a619e8293304cca622695de3c5e90314c743251c48c6c6655da201c2a2474082de035b5915

    • SSDEEP

      6144:g8CQrL7RheycnoebytHWt07uJuqwp/GM3REOy2QRq7FU3E4TFjgiWpiAL:g8CQnednVbytHHy3wp/2Oy27FU3E6Rgx

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks