General

  • Target

    d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118

  • Size

    4.2MB

  • Sample

    240909-2hp49awblc

  • MD5

    d733f2e3f5b6925b7a57d52592f2cdc9

  • SHA1

    d884741c23e51405af75fedd296b5a5788e432f1

  • SHA256

    7efd2936ffd94ab1fabf989fd75cb0f54253ce1950fe6bee4168b230c39e15cc

  • SHA512

    39c57209d89e9460222227099b1272ba49b29bd4a9cb31ff096cbeeae1812bc1a03f7086c24124cb83330aa23b216dc5ec62b04f38802eeee53801e0a92b66d7

  • SSDEEP

    98304:1AI+bekwfoM38+Y845C7ZloybZpE0CsJ91E8Ej5ehitYnL:mtb1MMz84M7ZW0Csv1M5duL

Malware Config

Extracted

Family

azorult

C2

http://194.32.78.34/inc/d/index.php

Targets

    • Target

      d733f2e3f5b6925b7a57d52592f2cdc9_JaffaCakes118

    • Size

      4.2MB

    • MD5

      d733f2e3f5b6925b7a57d52592f2cdc9

    • SHA1

      d884741c23e51405af75fedd296b5a5788e432f1

    • SHA256

      7efd2936ffd94ab1fabf989fd75cb0f54253ce1950fe6bee4168b230c39e15cc

    • SHA512

      39c57209d89e9460222227099b1272ba49b29bd4a9cb31ff096cbeeae1812bc1a03f7086c24124cb83330aa23b216dc5ec62b04f38802eeee53801e0a92b66d7

    • SSDEEP

      98304:1AI+bekwfoM38+Y845C7ZloybZpE0CsJ91E8Ej5ehitYnL:mtb1MMz84M7ZW0Csv1M5duL

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks