General

  • Target

    d4380f32ff7213083856b5761261b06b_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240908-m8jb3avekd

  • MD5

    d4380f32ff7213083856b5761261b06b

  • SHA1

    7ca506d05d44c190e5167f65089d8e26480b8a27

  • SHA256

    69e0fe03bc52e724db1e56fc6bc6561e9f2d06c571a044ba3d5939774355cc3e

  • SHA512

    c95ebc1cd582d603050fca9fc8024e0a587e08a245a15dfe3fecae33579e5d37812cb7008a6c505fef9e3ce91ed5d46b09965f56feecf376ef13073dfc5ce61f

  • SSDEEP

    49152:SjD3HtO9ypeEZqYRDf0q4UwnY8M6HtO9yk:SXHtO9ypeEZqYRDf0q4UwnYL6HtO9y

Malware Config

Extracted

Family

azorult

C2

http://begurtyut.info/wytpolo/index.php

Targets

    • Target

      d4380f32ff7213083856b5761261b06b_JaffaCakes118

    • Size

      1.8MB

    • MD5

      d4380f32ff7213083856b5761261b06b

    • SHA1

      7ca506d05d44c190e5167f65089d8e26480b8a27

    • SHA256

      69e0fe03bc52e724db1e56fc6bc6561e9f2d06c571a044ba3d5939774355cc3e

    • SHA512

      c95ebc1cd582d603050fca9fc8024e0a587e08a245a15dfe3fecae33579e5d37812cb7008a6c505fef9e3ce91ed5d46b09965f56feecf376ef13073dfc5ce61f

    • SSDEEP

      49152:SjD3HtO9ypeEZqYRDf0q4UwnY8M6HtO9yk:SXHtO9ypeEZqYRDf0q4UwnYL6HtO9y

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks