Analysis
-
max time kernel
122s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-05-2021 08:05
Static task
static1
Behavioral task
behavioral1
Sample
c685c42e90ca6bf2263df3d0f75387b9.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
c685c42e90ca6bf2263df3d0f75387b9.dll
-
Size
937KB
-
MD5
c685c42e90ca6bf2263df3d0f75387b9
-
SHA1
83fb61da38efbe587cbe692e1ea905404ec6ef18
-
SHA256
ea6f45d0aa95e66e3dbfaddb86daca33f3ac393ceabef34edbb8653a94960682
-
SHA512
d37d7b57c77912d9964682d743c4270be11a94a7e0401462034c4522983bfb886ca3e4e6388cd5dc86b20c03cb5b518d59498cc67ba3cc830b4eaba70b6ed000
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Attributes
-
build
250188
-
exe_type
loader
-
server_id
580
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1924 wrote to memory of 1244 1924 rundll32.exe rundll32.exe PID 1244 wrote to memory of 1368 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1368 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1368 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1368 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1468 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1468 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1468 1244 rundll32.exe cmd.exe PID 1244 wrote to memory of 1468 1244 rundll32.exe cmd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c685c42e90ca6bf2263df3d0f75387b9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c685c42e90ca6bf2263df3d0f75387b9.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Island3⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cd Matter m3⤵PID:1468
-
-