General
-
Target
402f67334592fe3c0745b4f876814b0a_JaffaCakes118
-
Size
1.1MB
-
Sample
240713-e1kadswalj
-
MD5
402f67334592fe3c0745b4f876814b0a
-
SHA1
9e96d9c2cc5c1516121dd845a1e52a642877d1bb
-
SHA256
4216715d3b9552e0c16affc8fd559469cf8958788679b3817610457537aa7dc0
-
SHA512
d3bd2f9228deb93e85b7e7818e93eac5b9f5af927988abb7e8697b83ea8cc915e633ccd4599543cdbce6f3668b89f1adfabf99b4efde9f74af1eca64663cb6a9
-
SSDEEP
6144:cLKd/9yO8EJKdRWWyU/PgJoK01tDWUej3dc9YJTVK1GHzbAW0tOpOZibXPU/gC9k:1dl7iutsClIqSYhjKT7x/++U0Z
Static task
static1
Behavioral task
behavioral1
Sample
402f67334592fe3c0745b4f876814b0a_JaffaCakes118.exe
Resource
win7-20240704-en
Malware Config
Extracted
gozi
Targets
-
-
Target
402f67334592fe3c0745b4f876814b0a_JaffaCakes118
-
Size
1.1MB
-
MD5
402f67334592fe3c0745b4f876814b0a
-
SHA1
9e96d9c2cc5c1516121dd845a1e52a642877d1bb
-
SHA256
4216715d3b9552e0c16affc8fd559469cf8958788679b3817610457537aa7dc0
-
SHA512
d3bd2f9228deb93e85b7e7818e93eac5b9f5af927988abb7e8697b83ea8cc915e633ccd4599543cdbce6f3668b89f1adfabf99b4efde9f74af1eca64663cb6a9
-
SSDEEP
6144:cLKd/9yO8EJKdRWWyU/PgJoK01tDWUej3dc9YJTVK1GHzbAW0tOpOZibXPU/gC9k:1dl7iutsClIqSYhjKT7x/++U0Z
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-