Analysis
-
max time kernel
25s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
08-06-2021 01:03
Static task
static1
Behavioral task
behavioral1
Sample
aafda6138e0a43b153cc003b11f3e5fa8bf9e929d2356ec536b931a0ce983aa1.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
aafda6138e0a43b153cc003b11f3e5fa8bf9e929d2356ec536b931a0ce983aa1.dll
-
Size
834KB
-
MD5
b8bc8b1740b329ff2baf16bcee6ca23d
-
SHA1
d9215e03d2ddae00041a4ddd731872025b3ce537
-
SHA256
aafda6138e0a43b153cc003b11f3e5fa8bf9e929d2356ec536b931a0ce983aa1
-
SHA512
526cee6275372aaa9a34e51a42e607e940b2c0652b45aa3acf5a2b92b8cda6dc1c117d891d64fc93e013869e8244615b7d5d76c2c9c89b02920a11d97a4ed4af
Malware Config
Extracted
Family
gozi_ifsb
Botnet
5500
C2
authd.feronok.com
app.bighomegl.at
Attributes
-
build
250204
-
exe_type
loader
-
server_id
580
rsa_pubkey.base64
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4432 wrote to memory of 4480 4432 rundll32.exe rundll32.exe PID 4432 wrote to memory of 4480 4432 rundll32.exe rundll32.exe PID 4432 wrote to memory of 4480 4432 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aafda6138e0a43b153cc003b11f3e5fa8bf9e929d2356ec536b931a0ce983aa1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aafda6138e0a43b153cc003b11f3e5fa8bf9e929d2356ec536b931a0ce983aa1.dll,#12⤵PID:4480