General
-
Target
ewgr.png.dll
-
Size
646KB
-
Sample
210302-qalv52kwwj
-
MD5
cf24c392a94a9bd8f381f0de2926a4f2
-
SHA1
bf5ba2b5f9062b1a99797b593e378a1e59faa142
-
SHA256
b4f98cb2d21258819d8678c29486a2e7854d576efc28b58d930551ca5aa24f20
-
SHA512
ef2707615abb03cdda353d1ed081814fd77b0af78315d410736bb5e989d42f634c75f876c062254c25ec96e5b7fbb78bf41c7651cbd7d2efa68a49de61848ec0
Static task
static1
Behavioral task
behavioral1
Sample
ewgr.png.dll
Resource
win7v20201028
Malware Config
Extracted
gozi_rm3
201193209
https://binobin.xyz
-
build
300932
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Targets
-
-
Target
ewgr.png.dll
-
Size
646KB
-
MD5
cf24c392a94a9bd8f381f0de2926a4f2
-
SHA1
bf5ba2b5f9062b1a99797b593e378a1e59faa142
-
SHA256
b4f98cb2d21258819d8678c29486a2e7854d576efc28b58d930551ca5aa24f20
-
SHA512
ef2707615abb03cdda353d1ed081814fd77b0af78315d410736bb5e989d42f634c75f876c062254c25ec96e5b7fbb78bf41c7651cbd7d2efa68a49de61848ec0
-
Blocklisted process makes network request
-