General

  • Target

    80dbb95b241157e43f898af46a203ee6_JaffaCakes118

  • Size

    449KB

  • Sample

    240529-qgv4bsgd29

  • MD5

    80dbb95b241157e43f898af46a203ee6

  • SHA1

    9ca947e6ca47918a197ca36bc7e855a9f59c305a

  • SHA256

    20481d1b88aa543d4011d497514cca88b6b4757a33bb950dde06c0436fb75cce

  • SHA512

    84b9884653b2a9fe427dda3f9d6de4a957de49534eed37aa4845dade71e479d185b2c3d796030e6997544823471c0d1cdea704f835ee7904c54658f460afe515

  • SSDEEP

    12288:xoL4EnU4T/vjL27xkuhG/4VAp1mcVYAmVLc08jIWYuTnuvUhGij7Wla7:xwnU4TDL27xLhG/eAicVYPlcDInuTuvy

Malware Config

Extracted

Family

azorult

C2

http://zeroziro.site/index.php

Targets

    • Target

      80dbb95b241157e43f898af46a203ee6_JaffaCakes118

    • Size

      449KB

    • MD5

      80dbb95b241157e43f898af46a203ee6

    • SHA1

      9ca947e6ca47918a197ca36bc7e855a9f59c305a

    • SHA256

      20481d1b88aa543d4011d497514cca88b6b4757a33bb950dde06c0436fb75cce

    • SHA512

      84b9884653b2a9fe427dda3f9d6de4a957de49534eed37aa4845dade71e479d185b2c3d796030e6997544823471c0d1cdea704f835ee7904c54658f460afe515

    • SSDEEP

      12288:xoL4EnU4T/vjL27xkuhG/4VAp1mcVYAmVLc08jIWYuTnuvUhGij7Wla7:xwnU4TDL27xLhG/eAicVYPlcDInuTuvy

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks