General

  • Target

    d492ed4b03c13e0b1c4cd51bdefb826f_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240908-rwdcha1djq

  • MD5

    d492ed4b03c13e0b1c4cd51bdefb826f

  • SHA1

    40c1d7e33e09ccc6a8114edb1e022281b9e06857

  • SHA256

    c99c2b1af9091f14a3d49bb5da5506a2c30ee2d284fad00cb4ba41d5c0858bf8

  • SHA512

    691e7513738a3c487422b86a38ab1a2dfc6a3c1e0fb7f808c1b6879e48db7a9a106ec022bca8ad39ec28d4b016aa582811005d97d585ba5d8cefbb79d764a6a1

  • SSDEEP

    12288:VAsX95800y5HxIStyndgEize3ssiQNgH0WVSutuNSyZx0FnIkv:VHpl5HxIPP8uKHXVS+usyotpv

Malware Config

Extracted

Family

azorult

C2

http://noveit.gq/022/index.php

Targets

    • Target

      d492ed4b03c13e0b1c4cd51bdefb826f_JaffaCakes118

    • Size

      1.3MB

    • MD5

      d492ed4b03c13e0b1c4cd51bdefb826f

    • SHA1

      40c1d7e33e09ccc6a8114edb1e022281b9e06857

    • SHA256

      c99c2b1af9091f14a3d49bb5da5506a2c30ee2d284fad00cb4ba41d5c0858bf8

    • SHA512

      691e7513738a3c487422b86a38ab1a2dfc6a3c1e0fb7f808c1b6879e48db7a9a106ec022bca8ad39ec28d4b016aa582811005d97d585ba5d8cefbb79d764a6a1

    • SSDEEP

      12288:VAsX95800y5HxIStyndgEize3ssiQNgH0WVSutuNSyZx0FnIkv:VHpl5HxIPP8uKHXVS+usyotpv

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks