General

  • Target

    7c8a2ee3f84541262e35ecdcd7612533_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240528-lwmnaafg46

  • MD5

    7c8a2ee3f84541262e35ecdcd7612533

  • SHA1

    e1052413814befeadd9a2155188028ec71c9f701

  • SHA256

    c8f59c8c5234028445890c238b6a4d0f7b163b67d8022f69dae5a187f3f3d6db

  • SHA512

    7f07fd2f75af54a28e1b3c112d15496077c5135f40c587d7a98963e6c39dd6584f05226fa7a57ef84c363bcc0af63a316dc47b5f894f321523061a8379b0f341

  • SSDEEP

    24576:BxbPTO+6vLNw9RbTmKm39sPmhpSXbCS0AiMEjPLFxEkNP3YQ:zb6N

Malware Config

Extracted

Family

azorult

C2

http://keyar12f.beget.tech/gate.php

Targets

    • Target

      7c8a2ee3f84541262e35ecdcd7612533_JaffaCakes118

    • Size

      1.3MB

    • MD5

      7c8a2ee3f84541262e35ecdcd7612533

    • SHA1

      e1052413814befeadd9a2155188028ec71c9f701

    • SHA256

      c8f59c8c5234028445890c238b6a4d0f7b163b67d8022f69dae5a187f3f3d6db

    • SHA512

      7f07fd2f75af54a28e1b3c112d15496077c5135f40c587d7a98963e6c39dd6584f05226fa7a57ef84c363bcc0af63a316dc47b5f894f321523061a8379b0f341

    • SSDEEP

      24576:BxbPTO+6vLNw9RbTmKm39sPmhpSXbCS0AiMEjPLFxEkNP3YQ:zb6N

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks