General
-
Target
ea8c5f227cabb069c7ce01ffe47d6b60_JaffaCakes118
-
Size
216KB
-
Sample
240919-ele25azenb
-
MD5
ea8c5f227cabb069c7ce01ffe47d6b60
-
SHA1
a592222b0e9df63e65e022b2de9e837f3c39d6bf
-
SHA256
58584394a7540f5986b06341fb2e054f8f76960913051d0338859fd048206e5c
-
SHA512
b27213af74067f65b4bce7d4bbb37dda6531601f0def9138ea5be5ecc6b232016083283b448a72fbbb41625d13e40d1403317680a65ec20d07fdb89a96d121ef
-
SSDEEP
6144:iTOUxPGXSSP3sqTlwRk5ZWxX+NvQG9gSSzfo2ANvCoZc+KkQ7T:iqUxPCBD+FX0QG9/Szfo2ANvCoZc+Kky
Static task
static1
Behavioral task
behavioral1
Sample
ea8c5f227cabb069c7ce01ffe47d6b60_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea8c5f227cabb069c7ce01ffe47d6b60_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
azorult
http://tresdaw.xyz/second/PL333/index.php
Targets
-
-
Target
ea8c5f227cabb069c7ce01ffe47d6b60_JaffaCakes118
-
Size
216KB
-
MD5
ea8c5f227cabb069c7ce01ffe47d6b60
-
SHA1
a592222b0e9df63e65e022b2de9e837f3c39d6bf
-
SHA256
58584394a7540f5986b06341fb2e054f8f76960913051d0338859fd048206e5c
-
SHA512
b27213af74067f65b4bce7d4bbb37dda6531601f0def9138ea5be5ecc6b232016083283b448a72fbbb41625d13e40d1403317680a65ec20d07fdb89a96d121ef
-
SSDEEP
6144:iTOUxPGXSSP3sqTlwRk5ZWxX+NvQG9gSSzfo2ANvCoZc+KkQ7T:iqUxPCBD+FX0QG9/Szfo2ANvCoZc+Kky
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Suspicious use of SetThreadContext
-