General

  • Target

    f76b81b0397ae313b8f6d19d95c49edf_JaffaCakes118

  • Size

    352KB

  • Sample

    240926-dkxecatfln

  • MD5

    f76b81b0397ae313b8f6d19d95c49edf

  • SHA1

    8f15106b524cc5db564845508a04ee3bf2709949

  • SHA256

    3e8b92cda2c0d1dc74de0b060f43c2baf23ab08af69667ddbbe66f78d5e0389a

  • SHA512

    d473bb6f8ae26418dffe3e9acaf6266e305c012b2fb57d5e82c8ffbc4c9cae6f1a4e496d5f3bdf0b7228964862a392f552b5847370331d8ad5fea9be7f3af9a6

  • SSDEEP

    6144:b87Sm49lFRQSAe5klIQm3n/ym1grjpY7nf9+v3lYdkv+hgG2xnG4c/gU:fm+3QSAdm3n/yogZgwv3Gqv0gG2tG4gv

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1100

C2

api10.laptok.at/api1

golang.feel500.at/api1

go.in100k.at/api1

Attributes
  • build

    250180

  • exe_type

    loader

  • server_id

    730

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      f76b81b0397ae313b8f6d19d95c49edf_JaffaCakes118

    • Size

      352KB

    • MD5

      f76b81b0397ae313b8f6d19d95c49edf

    • SHA1

      8f15106b524cc5db564845508a04ee3bf2709949

    • SHA256

      3e8b92cda2c0d1dc74de0b060f43c2baf23ab08af69667ddbbe66f78d5e0389a

    • SHA512

      d473bb6f8ae26418dffe3e9acaf6266e305c012b2fb57d5e82c8ffbc4c9cae6f1a4e496d5f3bdf0b7228964862a392f552b5847370331d8ad5fea9be7f3af9a6

    • SSDEEP

      6144:b87Sm49lFRQSAe5klIQm3n/ym1grjpY7nf9+v3lYdkv+hgG2xnG4c/gU:fm+3QSAdm3n/yogZgwv3Gqv0gG2tG4gv

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

MITRE ATT&CK Enterprise v15

Tasks