General
-
Target
JaffaCakes118_b11e8380bea82894d090c4cc46a4166e6a8f7346da603bd3b168834e33191e31
-
Size
606KB
-
Sample
241222-j9pzfs1jdw
-
MD5
cd6170fcdcefc9cb6e24a99f6e3dd2ac
-
SHA1
e95fbab2068972b8e2f044c9111dd9bb03d2e741
-
SHA256
b11e8380bea82894d090c4cc46a4166e6a8f7346da603bd3b168834e33191e31
-
SHA512
43d51adc56b5fc81956a5d8a44a5f94feba9a655476a588b17e2e839234ffc39fe0cf482a2960cf41d4e6636e4144938ff28129979a616d69646d9044ebfb034
-
SSDEEP
12288:G8dajLSIFcqRfyo4TG89UtoM+YD3h0QYDpnynKZ0febiL+eMq6FiIadzrg:Coqpyo4TGmUtoMapy60feKQiIE
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b11e8380bea82894d090c4cc46a4166e6a8f7346da603bd3b168834e33191e31.dll
Resource
win7-20240903-en
Malware Config
Extracted
gozi
Extracted
gozi
5566
outlook.com
peajame.com
gderrrpololo.net
-
base_path
/glik/
-
build
250211
-
dga_season
10
-
exe_type
loader
-
extension
.lwe
-
server_id
12
Targets
-
-
Target
JaffaCakes118_b11e8380bea82894d090c4cc46a4166e6a8f7346da603bd3b168834e33191e31
-
Size
606KB
-
MD5
cd6170fcdcefc9cb6e24a99f6e3dd2ac
-
SHA1
e95fbab2068972b8e2f044c9111dd9bb03d2e741
-
SHA256
b11e8380bea82894d090c4cc46a4166e6a8f7346da603bd3b168834e33191e31
-
SHA512
43d51adc56b5fc81956a5d8a44a5f94feba9a655476a588b17e2e839234ffc39fe0cf482a2960cf41d4e6636e4144938ff28129979a616d69646d9044ebfb034
-
SSDEEP
12288:G8dajLSIFcqRfyo4TG89UtoM+YD3h0QYDpnynKZ0febiL+eMq6FiIadzrg:Coqpyo4TGmUtoMapy60feKQiIE
-
Gozi family
-
Blocklisted process makes network request
-