General

  • Target

    ed93a59e0415752f2b397a5ca2f330bf_JaffaCakes118

  • Size

    139KB

  • Sample

    240920-pj7dpswfmp

  • MD5

    ed93a59e0415752f2b397a5ca2f330bf

  • SHA1

    b51beb92ad40d4fd244a1653fa7a20b96fcc6dc3

  • SHA256

    26118991c284f8c01f1c98848cf12378e48366c6ef83b83eca6ffd45f23d06f8

  • SHA512

    bfe399cee990aa3508d942b0bbbde68524cced6fea035e84e7f34e1f81cb4f69816da897acf9bf0a6c6d0023899216bba1872585c3c192fea26827098ffe24fb

  • SSDEEP

    3072:L5dDg5uEMvMVhq3cDy35epeFVDxAEF7iNhHBLfWRW5R/PS:LDgzMvMkcuJROEF2NxBDc8P

Malware Config

Extracted

Family

azorult

C2

http://51.15.62.59/AED77D05-A028-477C-B013-04F33F1385C3/index.php

Targets

    • Target

      ed93a59e0415752f2b397a5ca2f330bf_JaffaCakes118

    • Size

      139KB

    • MD5

      ed93a59e0415752f2b397a5ca2f330bf

    • SHA1

      b51beb92ad40d4fd244a1653fa7a20b96fcc6dc3

    • SHA256

      26118991c284f8c01f1c98848cf12378e48366c6ef83b83eca6ffd45f23d06f8

    • SHA512

      bfe399cee990aa3508d942b0bbbde68524cced6fea035e84e7f34e1f81cb4f69816da897acf9bf0a6c6d0023899216bba1872585c3c192fea26827098ffe24fb

    • SSDEEP

      3072:L5dDg5uEMvMVhq3cDy35epeFVDxAEF7iNhHBLfWRW5R/PS:LDgzMvMkcuJROEF2NxBDc8P

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks