General
-
Target
9c221775cf4d30670382ff3927ae79b1_JaffaCakes118
-
Size
680KB
-
Sample
241125-r2n17axrbm
-
MD5
9c221775cf4d30670382ff3927ae79b1
-
SHA1
1bf5f0426033dc223399bacea6397e04a7abdac2
-
SHA256
843546b8be7931953909b550583d3c898d256fd8f1e3e3a85b82fc9020b0d806
-
SHA512
b214976fd65c3b6301f345f9cb8ded15ba8fed445bf4588abdd7123bcf547530c32efd907d31b8cee7a36e835967aa253807ba70a38acb66728330b120c9911d
-
SSDEEP
12288:mkXkj9R2sk5ov5/Zhbj9vwK2O1jbjaHfldFXpwpheU:ms4Wm/ZhHJwK2Ab2HFZmeU
Behavioral task
behavioral1
Sample
9c221775cf4d30670382ff3927ae79b1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9c221775cf4d30670382ff3927ae79b1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
azorult
http://projectkanor.bit/az/index.php
Targets
-
-
Target
9c221775cf4d30670382ff3927ae79b1_JaffaCakes118
-
Size
680KB
-
MD5
9c221775cf4d30670382ff3927ae79b1
-
SHA1
1bf5f0426033dc223399bacea6397e04a7abdac2
-
SHA256
843546b8be7931953909b550583d3c898d256fd8f1e3e3a85b82fc9020b0d806
-
SHA512
b214976fd65c3b6301f345f9cb8ded15ba8fed445bf4588abdd7123bcf547530c32efd907d31b8cee7a36e835967aa253807ba70a38acb66728330b120c9911d
-
SSDEEP
12288:mkXkj9R2sk5ov5/Zhbj9vwK2O1jbjaHfldFXpwpheU:ms4Wm/ZhHJwK2Ab2HFZmeU
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Suspicious use of SetThreadContext
-