General
-
Target
61641459e0366.tiff
-
Size
701KB
-
Sample
211011-mqqy7aghfk
-
MD5
394afc3467913bb431bd51dcf73a6ecc
-
SHA1
903a81405b9f4dd02c49b72e6ef409b51ee42710
-
SHA256
301c87f66843ea0e9e8b455a212870b82b64559bfc1594f86217af077dfd0ecc
-
SHA512
4399be58333147bcbd4c1aae2e473a69dce243c1d6e849bb2c7b6b7ecb37dc6c4d501bf862bb4580462808cd1fbbb9d40c67c3c1f912e961a2c2d5698f0beead
Static task
static1
Behavioral task
behavioral1
Sample
61641459e0366.tiff.dll
Resource
win7v20210408
Malware Config
Extracted
gozi_ifsb
8899
msn.com/mail
breuranel.website
outlook.com/signup
areuranel.website
-
build
260212
-
dga_season
10
-
exe_type
loader
-
server_id
12
Targets
-
-
Target
61641459e0366.tiff
-
Size
701KB
-
MD5
394afc3467913bb431bd51dcf73a6ecc
-
SHA1
903a81405b9f4dd02c49b72e6ef409b51ee42710
-
SHA256
301c87f66843ea0e9e8b455a212870b82b64559bfc1594f86217af077dfd0ecc
-
SHA512
4399be58333147bcbd4c1aae2e473a69dce243c1d6e849bb2c7b6b7ecb37dc6c4d501bf862bb4580462808cd1fbbb9d40c67c3c1f912e961a2c2d5698f0beead
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
Blocklisted process makes network request
-