General
-
Target
2217.js
-
Size
278KB
-
Sample
210903-s1xsdadcc8
-
MD5
ed8988f1433e30276b87384f16825116
-
SHA1
10c3b841313d765e380460506d5e760b2423680a
-
SHA256
90663d341cc9a6e9d33df216882beea6dd451ab6a16e57f73392683018309b82
-
SHA512
aae697ea7ebe642a21a7e6670d1d5d0c761f85e2a9fada7f27d0f67f1ee1b4deec63cb316111302c3dbaf53dc12a75eb369bbdcae67d08af853a8c859d41482e
Static task
static1
Behavioral task
behavioral1
Sample
2217.js
Resource
win7v20210408
Malware Config
Extracted
https://quickdrive.ae/js/JS000082510952000/dll/assistant.php
Extracted
gozi_rm3
-
build
300981
Extracted
gozi_rm3
202108021
https://hotroad.cyou
-
build
300981
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Targets
-
-
Target
2217.js
-
Size
278KB
-
MD5
ed8988f1433e30276b87384f16825116
-
SHA1
10c3b841313d765e380460506d5e760b2423680a
-
SHA256
90663d341cc9a6e9d33df216882beea6dd451ab6a16e57f73392683018309b82
-
SHA512
aae697ea7ebe642a21a7e6670d1d5d0c761f85e2a9fada7f27d0f67f1ee1b4deec63cb316111302c3dbaf53dc12a75eb369bbdcae67d08af853a8c859d41482e
-
Blocklisted process makes network request
-
Executes dropped EXE
-