General
-
Target
JaffaCakes118_70d0c4cb985c9c3cd367b30148dda7a68e9f994ea1baf21588272c2f3be99a29
-
Size
3.0MB
-
Sample
241223-vpkd1swjdp
-
MD5
4bc202f4cfa6a2b3b5668194b89fce6f
-
SHA1
5dd9acac601530d7b01b353279be0c4462af5f04
-
SHA256
70d0c4cb985c9c3cd367b30148dda7a68e9f994ea1baf21588272c2f3be99a29
-
SHA512
4ed0750bb7e8ed344f7be271ed9b04a1b68a09a5a1cac8533f890cf144fd9dd276c50cb844dd2ab83ac2c6bc8b28fcf40517e00ef0051700f06d05ca5bca8ebf
-
SSDEEP
98304:edSYX9iCLFLgf4XXxRfxrm0xb0zyxNi4VN0jlx:uSVigfcRpHxY+xNJN0P
Behavioral task
behavioral1
Sample
infectedmars2021.doc
Resource
win7-20240708-en
Malware Config
Extracted
gozi
Extracted
gozi
5513
greenwoodgrace.website
-
base_path
/manifest/
-
build
250187
-
dga_season
10
-
exe_type
loader
-
extension
.cnx
-
server_id
12
Targets
-
-
Target
infectedmars2021.doc
-
Size
4.3MB
-
MD5
0c8555a71a055a1e553ffe8865cb3ea6
-
SHA1
a8e77218bdb915adec62580f95d3a8a679b18215
-
SHA256
2a7811607023a04ca559e46d7106588f4542af11352972ff84d28b49e59d4507
-
SHA512
ebd784a06b35e8affee01c16f599bdb99336ee5d720e540a56b550579b201d0a04d030cc412b9a120158e5c2ec5bb8e2c5b71fcc810c117f8c290377c87973a9
-
SSDEEP
49152:oVUg5AfUb76jl/PTV0maWj4qO4eiJbFFYRKFZW+sYzbtqrDpee26:o6gF2jxPpbaWjRnuv
-
Gozi family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-