General

  • Target

    c7107a245b566b976846e8dd62fa2db6_JaffaCakes118

  • Size

    689KB

  • Sample

    240828-r6948avalj

  • MD5

    c7107a245b566b976846e8dd62fa2db6

  • SHA1

    eef135e4f3bfc86cafc3c04ef0d947784a4cefeb

  • SHA256

    7997b23c4aa24f9cc7f1c48c78665dfc636327bd7529e9127b89f28483f9f551

  • SHA512

    19f6075abe251c383f74f46fd7672d19c6f30124b0cc417f023bead824175066672e4709018777175660551cd88a61ebf1b8bf946ab5421b846ec1ec6296c67c

  • SSDEEP

    12288:pANwRo+mv8QD4+0V16ue1rl5FP+7uVkEMYKQ77OJQsg6F7bgIGuuyJ4FAtgBRjW:pAT8QE+khGlLWWFUQ77OJQF6JExuuyl3

Malware Config

Extracted

Family

azorult

C2

http://anorelier.hk/index.php

Targets

    • Target

      c7107a245b566b976846e8dd62fa2db6_JaffaCakes118

    • Size

      689KB

    • MD5

      c7107a245b566b976846e8dd62fa2db6

    • SHA1

      eef135e4f3bfc86cafc3c04ef0d947784a4cefeb

    • SHA256

      7997b23c4aa24f9cc7f1c48c78665dfc636327bd7529e9127b89f28483f9f551

    • SHA512

      19f6075abe251c383f74f46fd7672d19c6f30124b0cc417f023bead824175066672e4709018777175660551cd88a61ebf1b8bf946ab5421b846ec1ec6296c67c

    • SSDEEP

      12288:pANwRo+mv8QD4+0V16ue1rl5FP+7uVkEMYKQ77OJQsg6F7bgIGuuyJ4FAtgBRjW:pAT8QE+khGlLWWFUQ77OJQF6JExuuyl3

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Vidar Stealer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks