Analysis
-
max time kernel
17s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
05-07-2021 14:50
Static task
static1
Behavioral task
behavioral1
Sample
3a94.dll
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
3a94.dll
-
Size
607KB
-
MD5
3a943173c6de419b7078e88c20997838
-
SHA1
56567824c6b5c62112a74daa7a1a66e2ec0505d3
-
SHA256
af98c908f45b6b7893b8cc3121517488c94a93d015af71cd86f8269a971a8836
-
SHA512
801f8f86158c23a44499fc8c5364cb6353a44fba09015d118341e1bd07a568fe4c2fe4b93ca691bb45b41b5f6ee2a6f73d7ffbfde3eb9cd7293295ffc530693c
Malware Config
Extracted
Family
gozi_ifsb
Botnet
6000
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250204
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 900 wrote to memory of 1168 900 rundll32.exe rundll32.exe PID 900 wrote to memory of 1168 900 rundll32.exe rundll32.exe PID 900 wrote to memory of 1168 900 rundll32.exe rundll32.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1168-114-0x0000000000000000-mapping.dmp
-
memory/1168-115-0x00000000735D0000-0x00000000735DD000-memory.dmpFilesize
52KB
-
memory/1168-116-0x00000000735D0000-0x0000000073700000-memory.dmpFilesize
1.2MB
-
memory/1168-117-0x0000000002E50000-0x0000000002EDE000-memory.dmpFilesize
568KB