General
-
Target
f5eade965124253a0173e81ea951ad17_JaffaCakes118
-
Size
460KB
-
Sample
240925-nnjyjasgpp
-
MD5
f5eade965124253a0173e81ea951ad17
-
SHA1
3a3db3cd1421b26233f436f2acfd933897f16a92
-
SHA256
ad956e1181935dd123ddd1117dd5ea19fcc3aebd5283870584bc48ddf1f1d5dd
-
SHA512
c1ca316773445c07bceddeb9ebd2fd68e85cd5c70b9bd21118a53bad48cdc1fee0ae873fc6f5008827d9b5ae57c19f5cb291e7fc7b06527c130a67a6b456fd0c
-
SSDEEP
12288:haEJ8pW9FPNTbWwrrqkBFU+4jdKnBSXVP:/J8+FVTbWwfqkChXV
Static task
static1
Behavioral task
behavioral1
Sample
f5eade965124253a0173e81ea951ad17_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
gozi
Extracted
gozi
10030
aljscallowjscallowallow.pw
allowjscjscallow.pw
-
build
215801
-
dga_base_url
z1.zedo.com/robots.txt
-
dga_crc
0x246640bb
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
f5eade965124253a0173e81ea951ad17_JaffaCakes118
-
Size
460KB
-
MD5
f5eade965124253a0173e81ea951ad17
-
SHA1
3a3db3cd1421b26233f436f2acfd933897f16a92
-
SHA256
ad956e1181935dd123ddd1117dd5ea19fcc3aebd5283870584bc48ddf1f1d5dd
-
SHA512
c1ca316773445c07bceddeb9ebd2fd68e85cd5c70b9bd21118a53bad48cdc1fee0ae873fc6f5008827d9b5ae57c19f5cb291e7fc7b06527c130a67a6b456fd0c
-
SSDEEP
12288:haEJ8pW9FPNTbWwrrqkBFU+4jdKnBSXVP:/J8+FVTbWwfqkChXV
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-