General
-
Target
339f3c74c70ecad94a1ed77ed695e0e184f4547be4d528c80d37ea7573c4bde0.zip
-
Size
553KB
-
Sample
210613-5l1mx52pvj
-
MD5
498f101d4c10dc9d515585187c25043c
-
SHA1
6d39c776c0d014f22def6ac1fd7f4c7ca3f83914
-
SHA256
603092da3b96d21dc0c4dcffd545fc27fce9c4a1afc8040a8a41a5e139817ea4
-
SHA512
2a0ed9ac455c0ddb628e0ecacbcf900f86a1b17178410532f7577111b013e066ebe837ddc65243ce94a785b6a82676c26bae2ab3cbc3bf2e60a3e6a00f30243f
Static task
static1
Behavioral task
behavioral1
Sample
339f3c74c70ecad94a1ed77ed695e0e184f4547be4d528c80d37ea7573c4bde0.dll
Resource
win7v20210410
Malware Config
Extracted
gozi_ifsb
4500
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
-
build
250188
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
339f3c74c70ecad94a1ed77ed695e0e184f4547be4d528c80d37ea7573c4bde0.dll
-
Size
937KB
-
MD5
941ccb3a8c0e865c06cc8a6aa29e1bc6
-
SHA1
454885f5d511ecd33f93cb96e3afbc2c01f37f22
-
SHA256
339f3c74c70ecad94a1ed77ed695e0e184f4547be4d528c80d37ea7573c4bde0
-
SHA512
ace5f70b832d8cf164eafdbf2193b471345d04b621d23faadb11ca1b0e33648b9df89becfe7c0be54aa3e6f88e6d6e8dd9efc8e44d9c96eee542e33ec493f60c
-