General
-
Target
shook.vob
-
Size
626KB
-
Sample
210602-n4qpamyd9j
-
MD5
9b080472af7585ae77e5185ae6af924d
-
SHA1
b094c1d5762533cf28ddca5248c5fc6ec2bcdea7
-
SHA256
d5a501f4cc25f94df7c0b7546a1eba7798ce4d28f4052332429d52329e8f34dc
-
SHA512
537efc90367d0350765f047dbe300899e1c6d632b346faff6dafa75c744b52cc166ab5742e6b5c001a23fd7ebf7f5cd7b088b1ae7785807e8631d7a3b0daabfd
Static task
static1
Behavioral task
behavioral1
Sample
shook.vob.dll
Resource
win7v20210410
Malware Config
Extracted
gozi_ifsb
5500
app.buboleinov.com
chat.veminiare.com
chat.billionady.com
app3.maintorna.com
-
build
250188
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
shook.vob
-
Size
626KB
-
MD5
9b080472af7585ae77e5185ae6af924d
-
SHA1
b094c1d5762533cf28ddca5248c5fc6ec2bcdea7
-
SHA256
d5a501f4cc25f94df7c0b7546a1eba7798ce4d28f4052332429d52329e8f34dc
-
SHA512
537efc90367d0350765f047dbe300899e1c6d632b346faff6dafa75c744b52cc166ab5742e6b5c001a23fd7ebf7f5cd7b088b1ae7785807e8631d7a3b0daabfd
-