General
-
Target
75ee8b8e5f600e7087b9f8309fa3e710_JaffaCakes118
-
Size
956KB
-
Sample
240526-sw4p5aca47
-
MD5
75ee8b8e5f600e7087b9f8309fa3e710
-
SHA1
9ccd00e33e53a3fb1fe3456f2997b5e02366de9f
-
SHA256
f0f18f94f3f6e81a3e8deb20a67b6ad2bab55042b05d0104545387f3c3a3cb63
-
SHA512
fe61a9f7b51b5160a28d515ae5f30056564e6790b31d3237df9f785036b3f2b2c9b13add90d24acf830076f794093763de256461f1da3d8da58a5c1b5e2a95b5
-
SSDEEP
24576:3EX2O/Gl3EwiTcr2YL0HHALGakafpcTsS25Sd3fo:3EyEwiMrLAABtxcT2Sd3g
Static task
static1
Behavioral task
behavioral1
Sample
75ee8b8e5f600e7087b9f8309fa3e710_JaffaCakes118.msi
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75ee8b8e5f600e7087b9f8309fa3e710_JaffaCakes118.msi
Resource
win10v2004-20240508-en
Malware Config
Extracted
azorult
http://46.17.46.109/index.php
Targets
-
-
Target
75ee8b8e5f600e7087b9f8309fa3e710_JaffaCakes118
-
Size
956KB
-
MD5
75ee8b8e5f600e7087b9f8309fa3e710
-
SHA1
9ccd00e33e53a3fb1fe3456f2997b5e02366de9f
-
SHA256
f0f18f94f3f6e81a3e8deb20a67b6ad2bab55042b05d0104545387f3c3a3cb63
-
SHA512
fe61a9f7b51b5160a28d515ae5f30056564e6790b31d3237df9f785036b3f2b2c9b13add90d24acf830076f794093763de256461f1da3d8da58a5c1b5e2a95b5
-
SSDEEP
24576:3EX2O/Gl3EwiTcr2YL0HHALGakafpcTsS25Sd3fo:3EyEwiMrLAABtxcT2Sd3g
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-