General

  • Target

    9e70d5f3986851c9ff4a9cfed31fd9a5_JaffaCakes118

  • Size

    2.4MB

  • Sample

    241125-24magsxrer

  • MD5

    9e70d5f3986851c9ff4a9cfed31fd9a5

  • SHA1

    3be690ce135b0835d374c8d0bb96be4c9faf483f

  • SHA256

    9274e1c3d9423ff83b6da773441148f487a9b4f5f54aa0f3d25266edad2e1219

  • SHA512

    50e4a22e56f37b4cbded882c70b37e6a4267fb8632dad97937cd58ed47fbc011f3e66409cfd85a23dd6d5cb650e3bc8364b14f5f4e844ffb3295640969d1f3a7

  • SSDEEP

    49152:aUax0MDAvfCWKsOOSWAVlPMvclqcvCQLKgAC0kX:XZMDAn0sHSWAVlUvcscvCQ/

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

2010

C2

login.lycos.com

iunsyntoqprabhosao.net

178.32.27.3

Attributes
  • build

    250161

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • dns_servers

    107.174.86.134

    107.175.127.22

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      9e70d5f3986851c9ff4a9cfed31fd9a5_JaffaCakes118

    • Size

      2.4MB

    • MD5

      9e70d5f3986851c9ff4a9cfed31fd9a5

    • SHA1

      3be690ce135b0835d374c8d0bb96be4c9faf483f

    • SHA256

      9274e1c3d9423ff83b6da773441148f487a9b4f5f54aa0f3d25266edad2e1219

    • SHA512

      50e4a22e56f37b4cbded882c70b37e6a4267fb8632dad97937cd58ed47fbc011f3e66409cfd85a23dd6d5cb650e3bc8364b14f5f4e844ffb3295640969d1f3a7

    • SSDEEP

      49152:aUax0MDAvfCWKsOOSWAVlPMvclqcvCQLKgAC0kX:XZMDAn0sHSWAVlUvcscvCQ/

MITRE ATT&CK Enterprise v15

Tasks