General

  • Target

    9c221775cf4d30670382ff3927ae79b1_JaffaCakes118

  • Size

    680KB

  • Sample

    241125-r2n17axrbm

  • MD5

    9c221775cf4d30670382ff3927ae79b1

  • SHA1

    1bf5f0426033dc223399bacea6397e04a7abdac2

  • SHA256

    843546b8be7931953909b550583d3c898d256fd8f1e3e3a85b82fc9020b0d806

  • SHA512

    b214976fd65c3b6301f345f9cb8ded15ba8fed445bf4588abdd7123bcf547530c32efd907d31b8cee7a36e835967aa253807ba70a38acb66728330b120c9911d

  • SSDEEP

    12288:mkXkj9R2sk5ov5/Zhbj9vwK2O1jbjaHfldFXpwpheU:ms4Wm/ZhHJwK2Ab2HFZmeU

Malware Config

Extracted

Family

azorult

C2

http://projectkanor.bit/az/index.php

Targets

    • Target

      9c221775cf4d30670382ff3927ae79b1_JaffaCakes118

    • Size

      680KB

    • MD5

      9c221775cf4d30670382ff3927ae79b1

    • SHA1

      1bf5f0426033dc223399bacea6397e04a7abdac2

    • SHA256

      843546b8be7931953909b550583d3c898d256fd8f1e3e3a85b82fc9020b0d806

    • SHA512

      b214976fd65c3b6301f345f9cb8ded15ba8fed445bf4588abdd7123bcf547530c32efd907d31b8cee7a36e835967aa253807ba70a38acb66728330b120c9911d

    • SSDEEP

      12288:mkXkj9R2sk5ov5/Zhbj9vwK2O1jbjaHfldFXpwpheU:ms4Wm/ZhHJwK2Ab2HFZmeU

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks