General

  • Target

    d208328b1d0996cb3d1d730f0612303d_JaffaCakes118

  • Size

    246KB

  • Sample

    240907-qnxkqswekn

  • MD5

    d208328b1d0996cb3d1d730f0612303d

  • SHA1

    fed786f708e4d412b63994741218834ead1c81ee

  • SHA256

    8ad3b43d19cc98a7b964e4a567775dfcc33b0c550ef474fd430879e918d2c343

  • SHA512

    907a336803b1fa410f6dc4015e80aa4a2b23b240855a93e97b78887b3a0acd3608d2b45c1025fa7fbd5071f19fcf6c9d152ed9901796a7f53f76bf4e9748ac92

  • SSDEEP

    6144:bJUB8mj4VuAzApYF4H5w/a1YNLV+SDtUNDNGuM:buSmSuAzApRCCYNRhDtUHGu

Malware Config

Extracted

Family

azorult

C2

http://kelolacode2849.duckdns.org/index.php

Targets

    • Target

      d208328b1d0996cb3d1d730f0612303d_JaffaCakes118

    • Size

      246KB

    • MD5

      d208328b1d0996cb3d1d730f0612303d

    • SHA1

      fed786f708e4d412b63994741218834ead1c81ee

    • SHA256

      8ad3b43d19cc98a7b964e4a567775dfcc33b0c550ef474fd430879e918d2c343

    • SHA512

      907a336803b1fa410f6dc4015e80aa4a2b23b240855a93e97b78887b3a0acd3608d2b45c1025fa7fbd5071f19fcf6c9d152ed9901796a7f53f76bf4e9748ac92

    • SSDEEP

      6144:bJUB8mj4VuAzApYF4H5w/a1YNLV+SDtUNDNGuM:buSmSuAzApRCCYNRhDtUHGu

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks