Analysis

  • max time kernel
    123s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    10-06-2021 17:23

General

  • Target

    xadar8.dll

  • Size

    599KB

  • MD5

    d73b40b069792b8535ecc530a5e77942

  • SHA1

    7844a90b3c4c8b5ca11197bfd458025edcf0506d

  • SHA256

    2aba8bfb0661db54f5cd2102453b791f9bbb1418bc6cd00a2e0124f0923824e0

  • SHA512

    bba470060653d428242afb34ae6edd83f27abb3bf5049bf401d50299681a7da735e3084b910361c35e7216ceb25ebf72429429a45b9a3b3a702a1b54b31b5592

Malware Config

Extracted

Family

gozi_ifsb

Botnet

6000

C2

authd.feronok.com

app.bighomegl.at

Attributes
  • build

    250204

  • exe_type

    loader

  • server_id

    580

rsa_pubkey.base64
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\xadar8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\xadar8.dll,#1
      2⤵
        PID:1224

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1224-60-0x0000000000000000-mapping.dmp
    • memory/1224-61-0x0000000076691000-0x0000000076693000-memory.dmp
      Filesize

      8KB

    • memory/1224-63-0x0000000074C40000-0x0000000074D29000-memory.dmp
      Filesize

      932KB

    • memory/1224-62-0x0000000074C40000-0x0000000074C4D000-memory.dmp
      Filesize

      52KB

    • memory/1224-64-0x00000000001A0000-0x00000000001A1000-memory.dmp
      Filesize

      4KB