General

  • Target

    7da15219077bb2b076ebf667e8d17608_JaffaCakes118

  • Size

    1.0MB

  • Sample

    241030-c61s8awnar

  • MD5

    7da15219077bb2b076ebf667e8d17608

  • SHA1

    f4869ce85c022450f3db4aa887455f6354017314

  • SHA256

    be94a8aa2852f9c10804658d0c59c93f93d29fc7fb3a61d7f351fe09d205c4d9

  • SHA512

    fc469798b744feca0d7e50641fb0f9433150ca857e274c89e721f84d3351c49af81f91b4b8aa33fb2f51266a430891764c2acea1b8f0e648f3b615e98a30a005

  • SSDEEP

    12288:n7Yw58/Dycjs+G9Oyer3+0oJawxayfT8Gj1PIqLaXb6FkRxhZ+DaN7V4OrdwoY:nlQDuX9ler+PJawMyfP+qw/Rxh

Malware Config

Extracted

Family

azorult

C2

http://193.247.144.18/index.php

Targets

    • Target

      7da15219077bb2b076ebf667e8d17608_JaffaCakes118

    • Size

      1.0MB

    • MD5

      7da15219077bb2b076ebf667e8d17608

    • SHA1

      f4869ce85c022450f3db4aa887455f6354017314

    • SHA256

      be94a8aa2852f9c10804658d0c59c93f93d29fc7fb3a61d7f351fe09d205c4d9

    • SHA512

      fc469798b744feca0d7e50641fb0f9433150ca857e274c89e721f84d3351c49af81f91b4b8aa33fb2f51266a430891764c2acea1b8f0e648f3b615e98a30a005

    • SSDEEP

      12288:n7Yw58/Dycjs+G9Oyer3+0oJawxayfT8Gj1PIqLaXb6FkRxhZ+DaN7V4OrdwoY:nlQDuX9ler+PJawMyfP+qw/Rxh

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks