Resubmissions
04-02-2021 17:01
210204-xrtmp5vtf6 1004-02-2021 15:50
210204-tkhxpx8dz2 1002-02-2021 23:28
210202-3js6anf7f2 10Analysis
-
max time kernel
72s -
max time network
104s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-02-2021 23:28
Static task
static1
Behavioral task
behavioral1
Sample
33.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
33.dll
-
Size
504KB
-
MD5
e3544f6cbe6b26af70c091ad6575a40f
-
SHA1
e4b6104981b735e2f1620fc27bb45fff539ee8ce
-
SHA256
5c428be510eee72712f41a9cd50292b5f45fcce039cca43c5f6238dab1d0021e
-
SHA512
7f4144351e84f9b6a746a682f2be72f9784ff14dcb9be1251c143bb73864aadb1621c29ece7ce86a25086bad35dfe9378a86c4393e582fb82029c3711df608ef
Malware Config
Extracted
Family
gozi_ifsb
Attributes
- dga_base_url
-
dga_crc
0
-
dga_season
0
- dga_tlds
- dns_servers
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1256 1192 rundll32.exe 31 PID 1192 wrote to memory of 1256 1192 rundll32.exe 31 PID 1192 wrote to memory of 1256 1192 rundll32.exe 31