Analysis
-
max time kernel
98s -
max time network
114s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-05-2021 17:56
Static task
static1
Behavioral task
behavioral1
Sample
2bb413e89a992af0ef05cade160409ff.dll
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
2bb413e89a992af0ef05cade160409ff.dll
-
Size
937KB
-
MD5
2bb413e89a992af0ef05cade160409ff
-
SHA1
2a0dacba68042ac60ec492ca1cf1788d1ae06f72
-
SHA256
eb0331d59dcc188740e4dec6d463a8947caeebb215560bf885d781213389d55a
-
SHA512
d9060fae3b6f6f69911c9e485aee30f13c278e0b379d5ff7fb4739ceb65f54e93a5941352d708ded5ea7f4e6d72856d4bbab489cc7cefed78bac598926c63c78
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 3680 wrote to memory of 856 3680 rundll32.exe rundll32.exe PID 3680 wrote to memory of 856 3680 rundll32.exe rundll32.exe PID 3680 wrote to memory of 856 3680 rundll32.exe rundll32.exe PID 856 wrote to memory of 1212 856 rundll32.exe cmd.exe PID 856 wrote to memory of 1212 856 rundll32.exe cmd.exe PID 856 wrote to memory of 1212 856 rundll32.exe cmd.exe PID 856 wrote to memory of 1736 856 rundll32.exe cmd.exe PID 856 wrote to memory of 1736 856 rundll32.exe cmd.exe PID 856 wrote to memory of 1736 856 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bb413e89a992af0ef05cade160409ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2bb413e89a992af0ef05cade160409ff.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Island3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Matter m3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/856-114-0x0000000000000000-mapping.dmp
-
memory/856-118-0x00000000735D0000-0x00000000736D4000-memory.dmpFilesize
1.0MB
-
memory/856-117-0x00000000735D0000-0x00000000735DE000-memory.dmpFilesize
56KB
-
memory/856-119-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/1212-115-0x0000000000000000-mapping.dmp
-
memory/1736-116-0x0000000000000000-mapping.dmp