General

  • Target

    JaffaCakes118_5f51907b9b458b61272ad82b98c712299cb770216917f27f31edf5d69bb68ffb

  • Size

    3.5MB

  • Sample

    241229-ql7ypasnam

  • MD5

    8e344449dd99dc38a23cfb0b09250bec

  • SHA1

    1f2bb38efcf49496ff1800eb4b5e03eef6fe14b2

  • SHA256

    5f51907b9b458b61272ad82b98c712299cb770216917f27f31edf5d69bb68ffb

  • SHA512

    6dbee07f16a81e5ade7d6703ddb1f370ff39b51e362c87cd4ac57dd4056fa5f01e40808f1aff56c5b5fb20f551d70a505b815a9004407fab4b98bed28882320c

  • SSDEEP

    49152:/IdKlU5c02jtfRvkKfSjh65woedtfnVx/bvQzwKX0BrjVoOURxdDRt5m+aKi8W/k:/tlUmZRMNjh9oQ/ugeFxdttYLxYL

Malware Config

Extracted

Family

azorult

C2

http://430lodsposlok.store/index.php

Targets

    • Target

      09158bf9c73f856f8a310ffa7238042d08d3a475ea34ffa6cee9e88d841c4a7e

    • Size

      3.6MB

    • MD5

      9a3a57198f755e211d4be90a33320fcd

    • SHA1

      4c97fb6c57008af22ded9e8e702aa2e9faabf467

    • SHA256

      09158bf9c73f856f8a310ffa7238042d08d3a475ea34ffa6cee9e88d841c4a7e

    • SHA512

      49509e30e4bf202efb9127753dad111148bfdbb53ae5aa8f86a2aca4aa78729150e82e306505d367bd06b328f475c4753a334f5b58d21332743dd72cf6642990

    • SSDEEP

      98304:x5aFNIJS6sXSRFAVU7RZUimDrW5++IH8JWCCtdBm3R:x5aFNH6+qRZUzrWAKJWCCtdBaR

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Modifies RDP port number used by Windows

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Deobfuscate/Decode Files or Information

      Payload decoded via CertUtil.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Users

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks