Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    e4f61c9f9bcee52224b350c2fba9aceb_JaffaCakes118

  • Size

    516KB

  • Sample

    240916-rraqtascqa

  • MD5

    e4f61c9f9bcee52224b350c2fba9aceb

  • SHA1

    952e986bce8c0d33cae31c0585e52be7fcddb55f

  • SHA256

    d523bde80f1d11c9f7da2fa0da2a091ee47f27ec67f21b3e905666d2ef40e6a8

  • SHA512

    53afc4739dfb95355295de86cdecf768384e8e3cb3ae1af948018803d18d079c0582fef319f30ad8b3b8a24e720c19f59a9fe3b9dfeda932471354148eb40f85

  • SSDEEP

    6144:NnytOc+R1cI1+U0JfLm6r1oG3a6qbKaRi:NnytOp+U05vlb

Malware Config

Extracted

Family

gozi

Targets

    • Target

      e4f61c9f9bcee52224b350c2fba9aceb_JaffaCakes118

    • Size

      516KB

    • MD5

      e4f61c9f9bcee52224b350c2fba9aceb

    • SHA1

      952e986bce8c0d33cae31c0585e52be7fcddb55f

    • SHA256

      d523bde80f1d11c9f7da2fa0da2a091ee47f27ec67f21b3e905666d2ef40e6a8

    • SHA512

      53afc4739dfb95355295de86cdecf768384e8e3cb3ae1af948018803d18d079c0582fef319f30ad8b3b8a24e720c19f59a9fe3b9dfeda932471354148eb40f85

    • SSDEEP

      6144:NnytOc+R1cI1+U0JfLm6r1oG3a6qbKaRi:NnytOp+U05vlb

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks