General
-
Target
book-AUY70-04022021.xls
-
Size
139KB
-
Sample
210205-bg2j9k67da
-
MD5
6bc6146cc33968b9b1f1ea29a65f28aa
-
SHA1
e681ce7f9b6a16c9926817c18365ba3610366da4
-
SHA256
8162e0799dc6887d63119af7836399684041e981d8e1cc48d0bf852dc785d8ce
-
SHA512
0e8fe206306c1fa2f5f27a9df172d8c8f6667eb67cb2ac58a0e9d2c928ba3725d1d3c857449a66b1f1f6154a8240a4234b95a61fd451a17c41dbe077874f5fa1
Behavioral task
behavioral1
Sample
book-AUY70-04022021.xls
Resource
win7v20201028
Malware Config
Extracted
http://uidacrtsppxece.com/ioir.png
Extracted
gozi_rm3
201193207
https://topitophug.xyz
-
build
300932
-
exe_type
loader
Targets
-
-
Target
book-AUY70-04022021.xls
-
Size
139KB
-
MD5
6bc6146cc33968b9b1f1ea29a65f28aa
-
SHA1
e681ce7f9b6a16c9926817c18365ba3610366da4
-
SHA256
8162e0799dc6887d63119af7836399684041e981d8e1cc48d0bf852dc785d8ce
-
SHA512
0e8fe206306c1fa2f5f27a9df172d8c8f6667eb67cb2ac58a0e9d2c928ba3725d1d3c857449a66b1f1f6154a8240a4234b95a61fd451a17c41dbe077874f5fa1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-