General

  • Target

    e8df4f444def00328deba49c2ae2b892_JaffaCakes118

  • Size

    564KB

  • Sample

    240918-l3qzaawalk

  • MD5

    e8df4f444def00328deba49c2ae2b892

  • SHA1

    2641a726d7f5f5449a03196e64b5bb57c9946c9c

  • SHA256

    7838c9662cbb26d06099f980a2e9ecec906bce913c28b24a28eec3cfa2f2e39c

  • SHA512

    617e7a5280975cbe4dc8ecfce342fc909233e900228391b6d2bec2dcc8ad4a81fb4be307a5790f244ef0797f402f85314549a21ad2313af637b0f347cfa9d0f4

  • SSDEEP

    6144:GpNop9zzvccdbw/Fi1xum4AlIwvJv4l9b8LhwNpHb0HvZrCbEhJddxanelsU+BV2:Gfopdrc8xknwvJv4lZtZ4ZlhJtKXBemU

Malware Config

Extracted

Family

azorult

C2

http://richme.top/index.php

Targets

    • Target

      e8df4f444def00328deba49c2ae2b892_JaffaCakes118

    • Size

      564KB

    • MD5

      e8df4f444def00328deba49c2ae2b892

    • SHA1

      2641a726d7f5f5449a03196e64b5bb57c9946c9c

    • SHA256

      7838c9662cbb26d06099f980a2e9ecec906bce913c28b24a28eec3cfa2f2e39c

    • SHA512

      617e7a5280975cbe4dc8ecfce342fc909233e900228391b6d2bec2dcc8ad4a81fb4be307a5790f244ef0797f402f85314549a21ad2313af637b0f347cfa9d0f4

    • SSDEEP

      6144:GpNop9zzvccdbw/Fi1xum4AlIwvJv4l9b8LhwNpHb0HvZrCbEhJddxanelsU+BV2:Gfopdrc8xknwvJv4lZtZ4ZlhJtKXBemU

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks