General

  • Target

    c4f6514f12ea4f1d36c950621c603d75_JaffaCakes118

  • Size

    112KB

  • Sample

    240827-n9td4a1erq

  • MD5

    c4f6514f12ea4f1d36c950621c603d75

  • SHA1

    4b1f95ee6689c72b6c97199354144dae5c987372

  • SHA256

    4e8044310dac5e083d3854e5c99d823f1331c2a6c8a11960b298772b6a20f00d

  • SHA512

    bec1b54c93de70abab23ad70f254843fba2838548481e036189a435d671222ac0f83723fcfd9a4b911f0972700e73f3a7ab161777e4b13152417039d93de2eb0

  • SSDEEP

    3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeaeWgislq:faZ1tme++wiF

Malware Config

Extracted

Family

azorult

C2

http://voda.bit/a/index.php

Targets

    • Target

      c4f6514f12ea4f1d36c950621c603d75_JaffaCakes118

    • Size

      112KB

    • MD5

      c4f6514f12ea4f1d36c950621c603d75

    • SHA1

      4b1f95ee6689c72b6c97199354144dae5c987372

    • SHA256

      4e8044310dac5e083d3854e5c99d823f1331c2a6c8a11960b298772b6a20f00d

    • SHA512

      bec1b54c93de70abab23ad70f254843fba2838548481e036189a435d671222ac0f83723fcfd9a4b911f0972700e73f3a7ab161777e4b13152417039d93de2eb0

    • SSDEEP

      3072:KExRaX6raoCoCyz6/mqv1JR+yBtGOeaeWgislq:faZ1tme++wiF

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks