General
-
Target
drfone.exe
-
Size
198KB
-
Sample
211102-edasfagdbj
-
MD5
545f38fbb74881142712052a5b6eabce
-
SHA1
4cbaf1ecb48629b163f4387605c8a9011e89183c
-
SHA256
7b8ef3f064d0de0c27d56ff4df7d360f0d546d32aabbdf96a746bab5c84277ec
-
SHA512
d58a0dd4dfce60fce85e7fbee653828dfcd6e0ff093ea3b92e5588bd8ca05bc5502e4f71145b7fa13645034db122c5ceb5c8b579d5525ceb4ec30ee161fd3673
Static task
static1
Behavioral task
behavioral1
Sample
drfone.exe
Resource
win7-en-20211014
Malware Config
Extracted
gozi_rm3
-
build
300932
-
exe_type
loader
Extracted
gozi_rm3
201193204
https://hapynewyear.xyz
-
build
300932
-
exe_type
loader
-
non_target_locale
RU
-
server_id
12
-
url_path
index.htm
Targets
-
-
Target
drfone.exe
-
Size
198KB
-
MD5
545f38fbb74881142712052a5b6eabce
-
SHA1
4cbaf1ecb48629b163f4387605c8a9011e89183c
-
SHA256
7b8ef3f064d0de0c27d56ff4df7d360f0d546d32aabbdf96a746bab5c84277ec
-
SHA512
d58a0dd4dfce60fce85e7fbee653828dfcd6e0ff093ea3b92e5588bd8ca05bc5502e4f71145b7fa13645034db122c5ceb5c8b579d5525ceb4ec30ee161fd3673
-