General
-
Target
JaffaCakes118_14f1072c37bc793296ca580fe33274e72cef5432f22375ce79114400eacb0599
-
Size
625KB
-
Sample
241227-cpmv2azjaz
-
MD5
e4f25a4a69e3fb8f3deb4e4f9c25fdab
-
SHA1
a2e9ca71b72d3d92ceac5493b011059e4c39a20d
-
SHA256
14f1072c37bc793296ca580fe33274e72cef5432f22375ce79114400eacb0599
-
SHA512
572ae7619f4f7364fc96d911fcefc9bb07fd33b8e0699ae94909baa79bb8878753536732a6e785ee4551487deb0e828e64c994b9324a0c062b2d8fc4189252a2
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZC:+w1lEKOpuYxiwkkgjAN8ZC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_14f1072c37bc793296ca580fe33274e72cef5432f22375ce79114400eacb0599.dll
Resource
win7-20240729-en
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Targets
-
-
Target
JaffaCakes118_14f1072c37bc793296ca580fe33274e72cef5432f22375ce79114400eacb0599
-
Size
625KB
-
MD5
e4f25a4a69e3fb8f3deb4e4f9c25fdab
-
SHA1
a2e9ca71b72d3d92ceac5493b011059e4c39a20d
-
SHA256
14f1072c37bc793296ca580fe33274e72cef5432f22375ce79114400eacb0599
-
SHA512
572ae7619f4f7364fc96d911fcefc9bb07fd33b8e0699ae94909baa79bb8878753536732a6e785ee4551487deb0e828e64c994b9324a0c062b2d8fc4189252a2
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8ZC:+w1lEKOpuYxiwkkgjAN8ZC
-
Gozi family
-
Blocklisted process makes network request
-