Analysis
-
max time kernel
39s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
11-05-2021 10:57
Static task
static1
Behavioral task
behavioral1
Sample
1752fe2b8419be8241ecd08859a5800f.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
1752fe2b8419be8241ecd08859a5800f.dll
-
Size
821KB
-
MD5
1752fe2b8419be8241ecd08859a5800f
-
SHA1
eb7346a6d5a53ddaf8fd073f266c64d642b40a7d
-
SHA256
e81869620b9a18c3702c7be2fcf2e170cbc5c3de1ddbc84ae1fe190b57e917a0
-
SHA512
0718e566bdec828d59890818a65af53f467d1bab92abbdd2ecfe3eca55be7ad3692793e4310ea41f2ab2a9f5e9fe6d29e1873cacc1614c6f2cceaf6b320c8f15
Malware Config
Extracted
Family
gozi_ifsb
Botnet
8877
C2
outlook.com/login
gmail.com
worunekulo.club
horunekulo.website
Attributes
-
build
250196
-
dga_season
10
-
exe_type
loader
-
server_id
12
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe PID 1612 wrote to memory of 2020 1612 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1752fe2b8419be8241ecd08859a5800f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1752fe2b8419be8241ecd08859a5800f.dll,#12⤵PID:2020
-