General
-
Target
nostalgia.dll
-
Size
476KB
-
Sample
210902-rrv2radcfl
-
MD5
fc6e37e0aed3ddf819bc3db52c3894d0
-
SHA1
422ee70aa729bbc279e39a1dbd4329585d5dee90
-
SHA256
07c4de5228d721b6ecd076e4fea4a8f1bc55ecc65e7f76e5aed8da390207db7b
-
SHA512
93c4b86d8fe124a2926f8f1fa84e2bbb96aa41972956e24cc97ed3015044577d179ec9715b8343694712c400aeb30842ad678b5f854081c7d6afbb29c9535bb4
Static task
static1
Behavioral task
behavioral1
Sample
nostalgia.dll
Resource
win7v20210408
Malware Config
Extracted
gozi_ifsb
1500
f1.bablefiler.at
f22.avanoruk.com
-
build
250211
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
nostalgia.dll
-
Size
476KB
-
MD5
fc6e37e0aed3ddf819bc3db52c3894d0
-
SHA1
422ee70aa729bbc279e39a1dbd4329585d5dee90
-
SHA256
07c4de5228d721b6ecd076e4fea4a8f1bc55ecc65e7f76e5aed8da390207db7b
-
SHA512
93c4b86d8fe124a2926f8f1fa84e2bbb96aa41972956e24cc97ed3015044577d179ec9715b8343694712c400aeb30842ad678b5f854081c7d6afbb29c9535bb4
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Blocklisted process makes network request
-