General

  • Target

    b8fb5a700ab6cc45485b11e243ee8d3b_JaffaCakes118

  • Size

    389KB

  • Sample

    240617-vec7yszgkj

  • MD5

    b8fb5a700ab6cc45485b11e243ee8d3b

  • SHA1

    1df99e880ad82f5729032ea5a7aa0e85fcc7f683

  • SHA256

    55367cd057edebd813637c5a857e217a1f52c5d09eb46aa45fef973855f31e56

  • SHA512

    a8571e1d7b8cf581b3a35bf2055335851de2761ef965cd65f69bb144be7496ad1fcd0766b7da4cbd56ab5833cf7a89e45c89ed424bae58e0702ace9dcd6dfd43

  • SSDEEP

    12288:5aKiMGJ3pubiPWUpkPd3QZmrOBo7GMBOLy9ko:5aKFziP/6Pd3NOBKPBOLy9ko

Malware Config

Extracted

Family

azorult

C2

http://207.154.240.23/index.php

Targets

    • Target

      Catalog.exe

    • Size

      714KB

    • MD5

      3af928b8c8ff9993e7567360d26275e6

    • SHA1

      b3a79f4b6fa9f4bcc4c8bab8b6eda8df3b0f0ee0

    • SHA256

      1206ddd174f5df61f70259ac6da12226590232dd5f70d3139aa290d381efecbe

    • SHA512

      9ef73554db5164ec5944b493d555e93182b0945f2f2a6a19e80b7598fe7b65a2f8a1dc4c3a09858683d8c38233af0763f4c68a9a5ff294420ed75b9a59e7ed87

    • SSDEEP

      12288:/cFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOQmT/3iJusPIW6F:lnYnuRcBIoGblBhk/qIX

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks