General
-
Target
textual.dll
-
Size
590KB
-
Sample
210623-ap6yqcdsps
-
MD5
f1daeecad06895db6b2c94f7eb1028a1
-
SHA1
12713fcec29130f2baefac245b30b4686ed7bb9b
-
SHA256
c7ba05674f44747d5685f36313fc0a77bc5afea3035fa0d14ee2f4dbfbcbff5c
-
SHA512
b0e17110cc4749e15b5659aa6aa542286c9617ae291f5666b48131ad73fc4e6de1e61d4a4a8b163093ff41d3ec8ea05bb491bac17e20d9a0574acd912e44d6c0
Static task
static1
Behavioral task
behavioral1
Sample
textual.dll
Resource
win7v20210408
Malware Config
Extracted
gozi_ifsb
4500
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
textual.dll
-
Size
590KB
-
MD5
f1daeecad06895db6b2c94f7eb1028a1
-
SHA1
12713fcec29130f2baefac245b30b4686ed7bb9b
-
SHA256
c7ba05674f44747d5685f36313fc0a77bc5afea3035fa0d14ee2f4dbfbcbff5c
-
SHA512
b0e17110cc4749e15b5659aa6aa542286c9617ae291f5666b48131ad73fc4e6de1e61d4a4a8b163093ff41d3ec8ea05bb491bac17e20d9a0574acd912e44d6c0
-