Analysis
-
max time kernel
29s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
29-06-2021 05:11
Static task
static1
General
-
Target
malware binary.dll
-
Size
492KB
-
MD5
84fd8b680be80ace7562c2a1f2547e96
-
SHA1
2528e75c0867dd07259b2fc42f0850d259eed418
-
SHA256
93ba5e117699976d0df8512ca37262af3dbb68897fc50167bacef1930c64816f
-
SHA512
e30ac5739174b6c1dba146e600fc2454b4fc89362ae953d14f26c9b77d90f117d89adb44c6af0f82c9b8f68874f5885316ee9993b1fdd08585210ce47f3353c4
Malware Config
Extracted
Family
gozi_ifsb
Botnet
6000
C2
authd.feronok.com
app.bighomegl.at
Attributes
-
build
250204
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
serpent.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3540 wrote to memory of 3932 3540 rundll32.exe rundll32.exe PID 3540 wrote to memory of 3932 3540 rundll32.exe rundll32.exe PID 3540 wrote to memory of 3932 3540 rundll32.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3932-114-0x0000000000000000-mapping.dmp
-
memory/3932-115-0x00000000045D0000-0x0000000004660000-memory.dmpFilesize
576KB
-
memory/3932-117-0x00000000045D1000-0x0000000004624000-memory.dmpFilesize
332KB
-
memory/3932-116-0x00000000045D0000-0x00000000045DD000-memory.dmpFilesize
52KB
-
memory/3932-118-0x0000000000B00000-0x0000000000C4A000-memory.dmpFilesize
1.3MB