General
-
Target
JaffaCakes118_ac2b4e227f880826ed43ccc9df706ab7ce8868baae5951e4c88e6720253bddac
-
Size
625KB
-
Sample
241225-ws9nra1pcv
-
MD5
4f1d2ae8b6625175486105b9c2d47bb5
-
SHA1
637c5ddac289bb4a9e3c477db015e1fc512d97fb
-
SHA256
ac2b4e227f880826ed43ccc9df706ab7ce8868baae5951e4c88e6720253bddac
-
SHA512
776a0082f81118556212874cadca722f65d530f43b1ce65142e971577ed27ec747484933bbb8dd733ebb8c038f720a66de0952072700573235dfca93e4adc17f
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZF:+w1lEKOpuYxiwkkgjAN8ZF
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ac2b4e227f880826ed43ccc9df706ab7ce8868baae5951e4c88e6720253bddac.dll
Resource
win7-20241010-en
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Targets
-
-
Target
JaffaCakes118_ac2b4e227f880826ed43ccc9df706ab7ce8868baae5951e4c88e6720253bddac
-
Size
625KB
-
MD5
4f1d2ae8b6625175486105b9c2d47bb5
-
SHA1
637c5ddac289bb4a9e3c477db015e1fc512d97fb
-
SHA256
ac2b4e227f880826ed43ccc9df706ab7ce8868baae5951e4c88e6720253bddac
-
SHA512
776a0082f81118556212874cadca722f65d530f43b1ce65142e971577ed27ec747484933bbb8dd733ebb8c038f720a66de0952072700573235dfca93e4adc17f
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZF:+w1lEKOpuYxiwkkgjAN8ZF
-
Gozi family
-
Blocklisted process makes network request
-