General
-
Target
bungle.rst
-
Size
529KB
-
Sample
210827-yd661h1sax
-
MD5
8390c9aff9b8f652c36252270d51fb30
-
SHA1
919ce33025c1901a2088b77c8543eb729fccf17a
-
SHA256
f41d351cba690cf05e4b5e5597b71697eb2e9125b656927aaf93edba25fbc8cd
-
SHA512
c1d5326f0a40d673aa1647842915d6eab70a34383238387bc2b7b4027d38d6d07676b71ff0a7e3d71d884c080f315714792459aaf49f90c3970404f032fe1a19
Static task
static1
Behavioral task
behavioral1
Sample
bungle.rst.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
bungle.rst.dll
Resource
win11
Malware Config
Extracted
gozi_ifsb
1500
f1.bablefiler.at
f22.avanoruk.com
-
build
250211
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
bungle.rst
-
Size
529KB
-
MD5
8390c9aff9b8f652c36252270d51fb30
-
SHA1
919ce33025c1901a2088b77c8543eb729fccf17a
-
SHA256
f41d351cba690cf05e4b5e5597b71697eb2e9125b656927aaf93edba25fbc8cd
-
SHA512
c1d5326f0a40d673aa1647842915d6eab70a34383238387bc2b7b4027d38d6d07676b71ff0a7e3d71d884c080f315714792459aaf49f90c3970404f032fe1a19
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Blocklisted process makes network request
-