General

  • Target

    fd0cd5e268223b869c1e05f34d432f52_JaffaCakes118

  • Size

    112KB

  • Sample

    240928-yvgf4athjj

  • MD5

    fd0cd5e268223b869c1e05f34d432f52

  • SHA1

    d6aa2e5d161ff893ac5a0217cff673c59abe53b3

  • SHA256

    c280b1fbe9269ef12df640b1b9d6e9aadbb8b7a1f81e3e994f348792a0978658

  • SHA512

    55cb7cc1b13827e23ed17c5dd8b756c9fc9a8b88714694ac91c0ec44b46836b84f7d1f981a483741bd612cdee003de989d45a00edf8d6914edbe60d23cc8ec62

  • SSDEEP

    3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/vxg/:Zzx7ZApszolIo7lf/ipT/v

Malware Config

Extracted

Family

azorult

C2

http://108.170.55.202/~mimicbng/kc/

Targets

    • Target

      fd0cd5e268223b869c1e05f34d432f52_JaffaCakes118

    • Size

      112KB

    • MD5

      fd0cd5e268223b869c1e05f34d432f52

    • SHA1

      d6aa2e5d161ff893ac5a0217cff673c59abe53b3

    • SHA256

      c280b1fbe9269ef12df640b1b9d6e9aadbb8b7a1f81e3e994f348792a0978658

    • SHA512

      55cb7cc1b13827e23ed17c5dd8b756c9fc9a8b88714694ac91c0ec44b46836b84f7d1f981a483741bd612cdee003de989d45a00edf8d6914edbe60d23cc8ec62

    • SSDEEP

      3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/vxg/:Zzx7ZApszolIo7lf/ipT/v

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks