General
-
Target
7c8a2ee3f84541262e35ecdcd7612533_JaffaCakes118
-
Size
1.3MB
-
Sample
240528-lwmnaafg46
-
MD5
7c8a2ee3f84541262e35ecdcd7612533
-
SHA1
e1052413814befeadd9a2155188028ec71c9f701
-
SHA256
c8f59c8c5234028445890c238b6a4d0f7b163b67d8022f69dae5a187f3f3d6db
-
SHA512
7f07fd2f75af54a28e1b3c112d15496077c5135f40c587d7a98963e6c39dd6584f05226fa7a57ef84c363bcc0af63a316dc47b5f894f321523061a8379b0f341
-
SSDEEP
24576:BxbPTO+6vLNw9RbTmKm39sPmhpSXbCS0AiMEjPLFxEkNP3YQ:zb6N
Static task
static1
Behavioral task
behavioral1
Sample
7c8a2ee3f84541262e35ecdcd7612533_JaffaCakes118.rtf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7c8a2ee3f84541262e35ecdcd7612533_JaffaCakes118.rtf
Resource
win10v2004-20240426-en
Malware Config
Extracted
azorult
http://keyar12f.beget.tech/gate.php
Targets
-
-
Target
7c8a2ee3f84541262e35ecdcd7612533_JaffaCakes118
-
Size
1.3MB
-
MD5
7c8a2ee3f84541262e35ecdcd7612533
-
SHA1
e1052413814befeadd9a2155188028ec71c9f701
-
SHA256
c8f59c8c5234028445890c238b6a4d0f7b163b67d8022f69dae5a187f3f3d6db
-
SHA512
7f07fd2f75af54a28e1b3c112d15496077c5135f40c587d7a98963e6c39dd6584f05226fa7a57ef84c363bcc0af63a316dc47b5f894f321523061a8379b0f341
-
SSDEEP
24576:BxbPTO+6vLNw9RbTmKm39sPmhpSXbCS0AiMEjPLFxEkNP3YQ:zb6N
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-