General
-
Target
b1fc7dc75445a016588402757fdd6ff6-vt.dll
-
Size
452KB
-
Sample
210623-jnylbfcgae
-
MD5
b1fc7dc75445a016588402757fdd6ff6
-
SHA1
12aa8a932e6711beca796f67e717523d6794de9e
-
SHA256
94eb81bc58adb976f21344d3eb273c9eb833afbcadd121eb2ad38f1ef07a1f85
-
SHA512
5ea1a7e0d938ed772ab59c486ca6d018814082e50bd000aafafd43929983244875792c958a4bda8b12edea1888392c98c33bb26d2d3afb1a037e1074b6ed9675
Static task
static1
Behavioral task
behavioral1
Sample
b1fc7dc75445a016588402757fdd6ff6-vt.dll
Resource
win7v20210410
Malware Config
Extracted
gozi_ifsb
2200
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
-
build
250180
-
exe_type
loader
-
server_id
730
Targets
-
-
Target
b1fc7dc75445a016588402757fdd6ff6-vt.dll
-
Size
452KB
-
MD5
b1fc7dc75445a016588402757fdd6ff6
-
SHA1
12aa8a932e6711beca796f67e717523d6794de9e
-
SHA256
94eb81bc58adb976f21344d3eb273c9eb833afbcadd121eb2ad38f1ef07a1f85
-
SHA512
5ea1a7e0d938ed772ab59c486ca6d018814082e50bd000aafafd43929983244875792c958a4bda8b12edea1888392c98c33bb26d2d3afb1a037e1074b6ed9675
-