General
-
Target
JaffaCakes118_87ae203e546c9b0bd43ef05a62fca9fdab57011acc8e3be6c8797e1c553d2ab0
-
Size
625KB
-
Sample
241224-rplejazkhp
-
MD5
400418455dd1a229168f3f8faaa2a706
-
SHA1
6cdb61c7bace9b00cfbbe6db58794654bbbc1455
-
SHA256
87ae203e546c9b0bd43ef05a62fca9fdab57011acc8e3be6c8797e1c553d2ab0
-
SHA512
5ef8eeec883f86e6ac1e74c182929b67d26d8814e8880d2fa199b59eff158307b5f19554d6267f8c4cec467ff8c4edb965a225ad96c2271173eb2bd591051f2b
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zx:+w1lEKOpuYxiwkkgjAN8Zx
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_87ae203e546c9b0bd43ef05a62fca9fdab57011acc8e3be6c8797e1c553d2ab0.dll
Resource
win7-20240708-en
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Targets
-
-
Target
JaffaCakes118_87ae203e546c9b0bd43ef05a62fca9fdab57011acc8e3be6c8797e1c553d2ab0
-
Size
625KB
-
MD5
400418455dd1a229168f3f8faaa2a706
-
SHA1
6cdb61c7bace9b00cfbbe6db58794654bbbc1455
-
SHA256
87ae203e546c9b0bd43ef05a62fca9fdab57011acc8e3be6c8797e1c553d2ab0
-
SHA512
5ef8eeec883f86e6ac1e74c182929b67d26d8814e8880d2fa199b59eff158307b5f19554d6267f8c4cec467ff8c4edb965a225ad96c2271173eb2bd591051f2b
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zx:+w1lEKOpuYxiwkkgjAN8Zx
-
Gozi family
-
Blocklisted process makes network request
-