Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
a6fbdbd819bab362066048e1cd6e30bf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a6fbdbd819bab362066048e1cd6e30bf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a6fbdbd819bab362066048e1cd6e30bf_JaffaCakes118.exe
-
Size
310KB
-
MD5
a6fbdbd819bab362066048e1cd6e30bf
-
SHA1
759316af53f1fa9c1c0118d157ce730e8f830b30
-
SHA256
98923f07009b4e65ca98551ee14d38910fc102d4d075fa590633c2a74a98976d
-
SHA512
a6bbebb64ea7dd961ea437651fab8edd39efd765ecd8343cd332452b0ef80554422f4149995929ca8097d6c7f67c8ffc16f297de22500fefe3c0decfb9f89e1a
-
SSDEEP
3072:8UBYZzcERJ6IVMgnKHuLW+dct7S5xtZqleMe3FzlxrfWbrcEOQR1jkfQsCFgmyow:iztJr3LWwUS5jZq01z/r8ruQR1jkIDw
Malware Config
Extracted
azorult
http://bloodmood.bit/p/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Azorult family
-
Unexpected DNS network traffic destination 17 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 162.248.241.94 Destination IP 151.80.147.153 Destination IP 80.233.248.109 Destination IP 173.249.7.187 Destination IP 5.45.97.127 Destination IP 82.141.39.32 Destination IP 94.247.43.254 Destination IP 172.98.193.42 Destination IP 198.206.14.241 Destination IP 91.217.137.44 Destination IP 46.101.70.183 Destination IP 107.172.42.186 Destination IP 130.255.78.223 Destination IP 173.212.234.232 Destination IP 50.3.82.215 Destination IP 128.52.130.209 Destination IP 192.52.166.110 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6fbdbd819bab362066048e1cd6e30bf_JaffaCakes118.exe