Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
25-05-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
587debb584be50cb0aa0dd1f8cab3c7e.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
587debb584be50cb0aa0dd1f8cab3c7e.dll
-
Size
937KB
-
MD5
587debb584be50cb0aa0dd1f8cab3c7e
-
SHA1
b989c1dd5b247ddaa8e64566803972c991b878d4
-
SHA256
b82a88b63e89ecdaa736b3b8a28d62db73854cb6f37bb32e4def2c76ce05ccd9
-
SHA512
b920333fc7f00df62689e2fe5ad419b4c4511c8749b89ebd61b9a01355dee7cb50b04e708871065b562c8c3cd93dc5ca371eb85261c768a10ebb64b10cc4b5c0
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 1044 wrote to memory of 2000 1044 rundll32.exe rundll32.exe PID 2000 wrote to memory of 1420 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1420 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1420 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1420 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1308 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1308 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1308 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1308 2000 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\587debb584be50cb0aa0dd1f8cab3c7e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\587debb584be50cb0aa0dd1f8cab3c7e.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Island3⤵PID:1420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Matter m3⤵PID:1308