Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-05-2021 17:58
Static task
static1
Behavioral task
behavioral1
Sample
e0ebdc2043f61719c22ab6de883ff842.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
e0ebdc2043f61719c22ab6de883ff842.dll
-
Size
937KB
-
MD5
e0ebdc2043f61719c22ab6de883ff842
-
SHA1
7b42580d8cccb48996b2181d80c52971036221fa
-
SHA256
98c29d3c1c76a00271ba5f2cf65106eb0870cf466e57954726143e293134971e
-
SHA512
a922ff41fef15f2a2c1e6c84b055cacca7624a29146f324384cbc9cf7aa828d64b015ffc808659b1962202cdd6193e7499166d0a7e99af904787c0a2fb65a38d
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 2000 1096 rundll32.exe rundll32.exe PID 2000 wrote to memory of 1204 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1204 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1204 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1204 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1484 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1484 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1484 2000 rundll32.exe cmd.exe PID 2000 wrote to memory of 1484 2000 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0ebdc2043f61719c22ab6de883ff842.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0ebdc2043f61719c22ab6de883ff842.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Island3⤵PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Matter m3⤵PID:1484
-
-