General

  • Target

    f67e3a124214f6da00015a838ac6a1e4_JaffaCakes118

  • Size

    222KB

  • MD5

    f67e3a124214f6da00015a838ac6a1e4

  • SHA1

    717e4cde593e09e8e00747cfb7706bf2c3c65158

  • SHA256

    beeb2df96896b88238fe53dc07b2dccfd81df994ebacc756c1255862288f8597

  • SHA512

    c9a87ec2fea543a5cbe056801f915ce3e1129edc2cfa4ca0b1c6fdb86d9e54960bfdbe30146251bb0552a945b513dcf76a72bfc4d68d552d7bb8476d7726f352

  • SSDEEP

    6144:/HExb7VwvtKNbnvSxYNiyf+D3Lu3y57H:cxb5wvtKRvSxY0G+D7u3G

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

4474

C2

lycos.com

mail.yahoo.com

193.56.255.251

193.56.255.250

193.56.255.249

numolerunosell.online

gumolerunosell.online

rumolerunosell.online

Attributes
  • base_path

    /images/

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • extension

    .avi

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f67e3a124214f6da00015a838ac6a1e4_JaffaCakes118
    .dll windows:5 windows x64 arch:x64

    a2bba8f9bc87dc77d912b0ff63f31a67


    Headers

    Imports

    Sections