General

  • Target

    a1e08b9606f07d719636172b7d7dfcad_JaffaCakes118

  • Size

    596KB

  • Sample

    240612-xntx6szdrk

  • MD5

    a1e08b9606f07d719636172b7d7dfcad

  • SHA1

    82f13b74d89c1df15ae5148a5fa1dfa5b3d2ae59

  • SHA256

    38a98f4740ed923913176a2ed5459288a6ba5d330855695fdc57395d650e4016

  • SHA512

    87601936125e6eab797b8fc052d1e9049944da136386e7157c5251dca3d39dfc6190130502285fcdad475a5c84c13390f49541d05d4bf9efc6b36192dc96d73c

  • SSDEEP

    6144:L9ksE0Bh/MUlE7t+v5EUd9+xNOL4gaorniDWA4pXv:6m/Auvd9+x2daaniDWN

Malware Config

Extracted

Family

azorult

C2

http://kitchenraja.in/fort/32/index.php

Targets

    • Target

      a1e08b9606f07d719636172b7d7dfcad_JaffaCakes118

    • Size

      596KB

    • MD5

      a1e08b9606f07d719636172b7d7dfcad

    • SHA1

      82f13b74d89c1df15ae5148a5fa1dfa5b3d2ae59

    • SHA256

      38a98f4740ed923913176a2ed5459288a6ba5d330855695fdc57395d650e4016

    • SHA512

      87601936125e6eab797b8fc052d1e9049944da136386e7157c5251dca3d39dfc6190130502285fcdad475a5c84c13390f49541d05d4bf9efc6b36192dc96d73c

    • SSDEEP

      6144:L9ksE0Bh/MUlE7t+v5EUd9+xNOL4gaorniDWA4pXv:6m/Auvd9+x2daaniDWN

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks