General
-
Target
3c04b66bac4da25cab371b8b4eff27a0_JaffaCakes118
-
Size
379KB
-
Sample
241012-zvh6csvgql
-
MD5
3c04b66bac4da25cab371b8b4eff27a0
-
SHA1
4baf4140dca85d3417d28a991b9d3f56d5df8d59
-
SHA256
529703b6eb07ca5fd66dd13fc050250a6d81e4a78a27ac062c919825e2734e3d
-
SHA512
550abb295b91e5d23267ecdc57c2c4cfbbbdfccf300b64e4eaad5245f704e32fcff0e5991595973f50ad5982c7822a25738f81382e4c4fc06f97058e2f7a9c83
-
SSDEEP
6144:B7qdqAPhbXKdiT5CQJjK4Rqhv5ZD4eadxrNbp8MpjAeuLTDUp/1Y7jB:BhAP16ETY0jVGZD4ZRNbp8AUeyDUp9Yx
Static task
static1
Behavioral task
behavioral1
Sample
3c04b66bac4da25cab371b8b4eff27a0_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
gozi
Extracted
gozi
1002
romaya.ru
matashka.ru
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
3c04b66bac4da25cab371b8b4eff27a0_JaffaCakes118
-
Size
379KB
-
MD5
3c04b66bac4da25cab371b8b4eff27a0
-
SHA1
4baf4140dca85d3417d28a991b9d3f56d5df8d59
-
SHA256
529703b6eb07ca5fd66dd13fc050250a6d81e4a78a27ac062c919825e2734e3d
-
SHA512
550abb295b91e5d23267ecdc57c2c4cfbbbdfccf300b64e4eaad5245f704e32fcff0e5991595973f50ad5982c7822a25738f81382e4c4fc06f97058e2f7a9c83
-
SSDEEP
6144:B7qdqAPhbXKdiT5CQJjK4Rqhv5ZD4eadxrNbp8MpjAeuLTDUp/1Y7jB:BhAP16ETY0jVGZD4ZRNbp8AUeyDUp9Yx
-
Suspicious use of SetThreadContext
-