General

  • Target

    32c1aec1dc1dc4a2ccf23b0897f0f6c8_JaffaCakes118

  • Size

    112KB

  • Sample

    241011-b5n8csyeng

  • MD5

    32c1aec1dc1dc4a2ccf23b0897f0f6c8

  • SHA1

    27e010b966752f35750a5e0b7f17703e1308cf45

  • SHA256

    3b302aaa657ae4a0bbdbff78c86cfc0ab2bdd72ff8a4a42f2a3fefd737b96abf

  • SHA512

    64bdda294216a483a1ece6d1fc0e697024b4201b807f0fa9d0250b61ea4a0ccfbffadbc1066d6d7e4f86c44cf65eda06017ae5ff5fae97f89c7b7cda3b10b9b0

  • SSDEEP

    3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/Dxg/:Zzx7ZApszolIo7lf/ipT/D

Malware Config

Extracted

Family

azorult

C2

http://nikoskuolis.com/turbo/

Targets

    • Target

      32c1aec1dc1dc4a2ccf23b0897f0f6c8_JaffaCakes118

    • Size

      112KB

    • MD5

      32c1aec1dc1dc4a2ccf23b0897f0f6c8

    • SHA1

      27e010b966752f35750a5e0b7f17703e1308cf45

    • SHA256

      3b302aaa657ae4a0bbdbff78c86cfc0ab2bdd72ff8a4a42f2a3fefd737b96abf

    • SHA512

      64bdda294216a483a1ece6d1fc0e697024b4201b807f0fa9d0250b61ea4a0ccfbffadbc1066d6d7e4f86c44cf65eda06017ae5ff5fae97f89c7b7cda3b10b9b0

    • SSDEEP

      3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/Dxg/:Zzx7ZApszolIo7lf/ipT/D

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

MITRE ATT&CK Enterprise v15

Tasks