General
-
Target
blargh.dll
-
Size
368KB
-
Sample
210906-1m6gcsbdh9
-
MD5
fb4868e55a1dc8b84833262ac5ff6254
-
SHA1
af32286f8eaf266d4ee609aca40cad4a2221717b
-
SHA256
b7d73139f8758b04508d6873dd29011ab35b336b73ece0d4ea0710399c960180
-
SHA512
f35681252e85ac08f9754b5301545fd6f0eb87c512d000ae2618a6d8f0858e90b63714a0af11791610589a61d3e45d9d746f429eb4e128a1d80b5533e4d4ef9f
Static task
static1
Behavioral task
behavioral1
Sample
blargh.dll
Resource
win7-en
Malware Config
Extracted
gozi_ifsb
8877
outlook.com
lureborufer.store
dureborufer.store
-
build
250212
-
dga_season
10
-
exe_type
loader
-
server_id
12
Targets
-
-
Target
blargh.dll
-
Size
368KB
-
MD5
fb4868e55a1dc8b84833262ac5ff6254
-
SHA1
af32286f8eaf266d4ee609aca40cad4a2221717b
-
SHA256
b7d73139f8758b04508d6873dd29011ab35b336b73ece0d4ea0710399c960180
-
SHA512
f35681252e85ac08f9754b5301545fd6f0eb87c512d000ae2618a6d8f0858e90b63714a0af11791610589a61d3e45d9d746f429eb4e128a1d80b5533e4d4ef9f
-
Blocklisted process makes network request
-