General
-
Target
ae3d4a4285ff6a422868d38e54d393d13a578471.focy3
-
Size
306KB
-
Sample
210621-9cxh1xt4c2
-
MD5
9f5e19156a588ca6eb508023c438514b
-
SHA1
ae3d4a4285ff6a422868d38e54d393d13a578471
-
SHA256
9a1b4350e4ad39bd03c8d186cd18a318dba73dfe78775d448210942a19ba7806
-
SHA512
ff473dcef30a4e19836e3993b0cd2db47afddbb5b91189c14cd93e8fa33b89ed9046a2a2778d059bcbe4868cb0c3598f37cff0a8e605b5c2cc53f27199f01bd5
Static task
static1
Behavioral task
behavioral1
Sample
ae3d4a4285ff6a422868d38e54d393d13a578471.focy3.dll
Resource
win7v20210408
Malware Config
Extracted
gozi_ifsb
6000
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
ae3d4a4285ff6a422868d38e54d393d13a578471.focy3
-
Size
306KB
-
MD5
9f5e19156a588ca6eb508023c438514b
-
SHA1
ae3d4a4285ff6a422868d38e54d393d13a578471
-
SHA256
9a1b4350e4ad39bd03c8d186cd18a318dba73dfe78775d448210942a19ba7806
-
SHA512
ff473dcef30a4e19836e3993b0cd2db47afddbb5b91189c14cd93e8fa33b89ed9046a2a2778d059bcbe4868cb0c3598f37cff0a8e605b5c2cc53f27199f01bd5
-