General
-
Target
SecuriteInfo.com.Win32.Kryptik.HJSQ.12709.32696
-
Size
197KB
-
Sample
210316-4cthsmzpys
-
MD5
5d600596afcd9e9ee6767ca449257581
-
SHA1
c4d359789bdc0066f2ca4b4e383cb18a5d8d2f7f
-
SHA256
eb5d21b247b7552956d9ed05df2de0f366835db3977c18291b65fdb876897126
-
SHA512
f111033343cfbd543d83de05b61d3ff605eae86d35093e00e10146b87663df6793410d37c84b577dd737bf708097678f44785079518817a5c14ecc73f396c5a3
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Kryptik.HJSQ.12709.32696.dll
Resource
win7v20201028
Malware Config
Extracted
gozi_ifsb
3300
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
-
build
250180
-
exe_type
loader
-
server_id
730
Targets
-
-
Target
SecuriteInfo.com.Win32.Kryptik.HJSQ.12709.32696
-
Size
197KB
-
MD5
5d600596afcd9e9ee6767ca449257581
-
SHA1
c4d359789bdc0066f2ca4b4e383cb18a5d8d2f7f
-
SHA256
eb5d21b247b7552956d9ed05df2de0f366835db3977c18291b65fdb876897126
-
SHA512
f111033343cfbd543d83de05b61d3ff605eae86d35093e00e10146b87663df6793410d37c84b577dd737bf708097678f44785079518817a5c14ecc73f396c5a3
-