General
-
Target
98870053f992cdf24078e994d74a2390_JaffaCakes118
-
Size
352KB
-
Sample
241125-cdq4basjfv
-
MD5
98870053f992cdf24078e994d74a2390
-
SHA1
ab1b4fa7bd2ba730ba12336bc3a15bc7b2c55d84
-
SHA256
fea6adf451d8a886caf3f2c2ee7ea298a0ae15640443227310ab12a18ff42086
-
SHA512
c1668b500eae59108d07f38605c381c7832ba6424522ff6f458914ccf7b90986e141f6a1e59e5ffca864862558b491c085188cb2818e94250fd08a4969c99589
-
SSDEEP
6144:RwtcuvtLsnTE/3OeLWKr4aa94eNekkNFhHpUHSaBfJER:RwKuZHWIehNe9FRMf4
Static task
static1
Behavioral task
behavioral1
Sample
98870053f992cdf24078e994d74a2390_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
gozi
Extracted
gozi
1050
fkklqkjgnr.com
sinpotikos.com
bnkalirmf.com
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
98870053f992cdf24078e994d74a2390_JaffaCakes118
-
Size
352KB
-
MD5
98870053f992cdf24078e994d74a2390
-
SHA1
ab1b4fa7bd2ba730ba12336bc3a15bc7b2c55d84
-
SHA256
fea6adf451d8a886caf3f2c2ee7ea298a0ae15640443227310ab12a18ff42086
-
SHA512
c1668b500eae59108d07f38605c381c7832ba6424522ff6f458914ccf7b90986e141f6a1e59e5ffca864862558b491c085188cb2818e94250fd08a4969c99589
-
SSDEEP
6144:RwtcuvtLsnTE/3OeLWKr4aa94eNekkNFhHpUHSaBfJER:RwKuZHWIehNe9FRMf4
-
Gozi family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3