General
-
Target
JaffaCakes118_5456f668b1bc6900dc03e73e10e97d14552924542fbfa17ad2d7c528322d6c30
-
Size
625KB
-
Sample
241223-wtak2sxjbn
-
MD5
c74b1afc7d3feb558e9bbe70023f5d0b
-
SHA1
38aaf1c891299b83f0a311acd131f7d6dcf48bfa
-
SHA256
5456f668b1bc6900dc03e73e10e97d14552924542fbfa17ad2d7c528322d6c30
-
SHA512
d4f8562bfeacac21a3cd3777f2943ba3261494fdc09223224ee30e38769498cfe2c370ef5e897d6203b02fa90e6631556b299bcbd3400a6f06e72e383e961f46
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zi:+w1lEKOpuYxiwkkgjAN8Zi
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5456f668b1bc6900dc03e73e10e97d14552924542fbfa17ad2d7c528322d6c30.dll
Resource
win7-20240708-en
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Targets
-
-
Target
JaffaCakes118_5456f668b1bc6900dc03e73e10e97d14552924542fbfa17ad2d7c528322d6c30
-
Size
625KB
-
MD5
c74b1afc7d3feb558e9bbe70023f5d0b
-
SHA1
38aaf1c891299b83f0a311acd131f7d6dcf48bfa
-
SHA256
5456f668b1bc6900dc03e73e10e97d14552924542fbfa17ad2d7c528322d6c30
-
SHA512
d4f8562bfeacac21a3cd3777f2943ba3261494fdc09223224ee30e38769498cfe2c370ef5e897d6203b02fa90e6631556b299bcbd3400a6f06e72e383e961f46
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zi:+w1lEKOpuYxiwkkgjAN8Zi
-
Gozi family
-
Blocklisted process makes network request
-