General

  • Target

    7ada8c7ed3e5c9b38374572faa7dc2dd_JaffaCakes118

  • Size

    3.7MB

  • Sample

    241028-1y5n7swlal

  • MD5

    7ada8c7ed3e5c9b38374572faa7dc2dd

  • SHA1

    04e0ef66a483f87dc43976f63167a9613a2dec34

  • SHA256

    82461925ccb615d58d132fbba2a7a49ba60c635f91515a0dc2e99c6a19d65d4f

  • SHA512

    76d96811e697f62eaac9e103463e36c6231eeb3c3380ea58e7a57ecefdb3de3fe4ac78a2ec5a8e67b16115665f7fd1ed83b366ca902f4dba8d9c2387c8512ea3

  • SSDEEP

    98304:SAYRWJ3guzrI7fiL9tgZZEkpDwyPVg1b3QOQYRitH0RSXJgGCnUMW8BMHDWXK:SPWLr3gzNPPVg1brJRitJ5gHD7mp

Malware Config

Extracted

Family

azorult

C2

https://livdecor.pt/work/Panel/index.php

Targets

    • Target

      7ada8c7ed3e5c9b38374572faa7dc2dd_JaffaCakes118

    • Size

      3.7MB

    • MD5

      7ada8c7ed3e5c9b38374572faa7dc2dd

    • SHA1

      04e0ef66a483f87dc43976f63167a9613a2dec34

    • SHA256

      82461925ccb615d58d132fbba2a7a49ba60c635f91515a0dc2e99c6a19d65d4f

    • SHA512

      76d96811e697f62eaac9e103463e36c6231eeb3c3380ea58e7a57ecefdb3de3fe4ac78a2ec5a8e67b16115665f7fd1ed83b366ca902f4dba8d9c2387c8512ea3

    • SSDEEP

      98304:SAYRWJ3guzrI7fiL9tgZZEkpDwyPVg1b3QOQYRitH0RSXJgGCnUMW8BMHDWXK:SPWLr3gzNPPVg1brJRitJ5gHD7mp

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Executes dropped EXE

    • Loads dropped DLL

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks