General
-
Target
5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118
-
Size
749KB
-
Sample
240517-r911qacg3x
-
MD5
5016784605ad3fd883fbdfdd5fbd469f
-
SHA1
30100663d3d88d7399948f7f92602efcb70b5a86
-
SHA256
14d4db1adde49001f81cb670a60f9d40fc7dea4b96cd77029ca87b44ccb586c8
-
SHA512
3f61dac201d25c5cb8932e9bed8b762c6897462edf912091e6921f2895645908b64c91a779f8db0cac76a0ddae19808d9ba6ce7fb27cd0a0153c5bf20d01f116
-
SSDEEP
12288:INVtF21kgh6j10JGCDn3NVEoYFA5rId7ipJC:INVtEjcMfTpYC5cmHC
Static task
static1
Behavioral task
behavioral1
Sample
5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118.dll
Resource
win7-20240221-en
Malware Config
Extracted
gozi
Extracted
gozi
700
http://cxzko43pnr7ujnte.onion
http://intraders-support.at
http://freshness-girls.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
5016784605ad3fd883fbdfdd5fbd469f_JaffaCakes118
-
Size
749KB
-
MD5
5016784605ad3fd883fbdfdd5fbd469f
-
SHA1
30100663d3d88d7399948f7f92602efcb70b5a86
-
SHA256
14d4db1adde49001f81cb670a60f9d40fc7dea4b96cd77029ca87b44ccb586c8
-
SHA512
3f61dac201d25c5cb8932e9bed8b762c6897462edf912091e6921f2895645908b64c91a779f8db0cac76a0ddae19808d9ba6ce7fb27cd0a0153c5bf20d01f116
-
SSDEEP
12288:INVtF21kgh6j10JGCDn3NVEoYFA5rId7ipJC:INVtEjcMfTpYC5cmHC
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-