Analysis
-
max time kernel
34s -
max time network
66s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-07-2021 14:39
Static task
static1
Behavioral task
behavioral1
Sample
9b9dc.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
9b9dc.dll
-
Size
420KB
-
MD5
9b9dcba4b633e44b85fa93b9499b89aa
-
SHA1
dd7745cb5b057df865a75bb110ded7c20528bfde
-
SHA256
5f9688e1d0b2e2b1240946dcc9fc145362cb4c1b76acd74bd85e75afc3ff1b91
-
SHA512
4f7ed3354405099d43ddc615dce09f35ac2ae1bba3bf8e58af44aa6ed6c741ca80184e7c6be63afe01dcbb3dcfe2257162955002ce65ea3559e6a204aba7680b
Malware Config
Extracted
Family
gozi_ifsb
Botnet
4500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250204
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 652 wrote to memory of 3460 652 rundll32.exe rundll32.exe PID 652 wrote to memory of 3460 652 rundll32.exe rundll32.exe PID 652 wrote to memory of 3460 652 rundll32.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3460-114-0x0000000000000000-mapping.dmp
-
memory/3460-115-0x00000000049E0000-0x0000000004AE1000-memory.dmpFilesize
1.0MB
-
memory/3460-116-0x00000000049E0000-0x00000000049ED000-memory.dmpFilesize
52KB
-
memory/3460-117-0x00000000049E1000-0x0000000004A2A000-memory.dmpFilesize
292KB
-
memory/3460-118-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB