Static task
static1
General
-
Target
ddbf17981fed857e966ff809166b6d320e04d8527690090db8c51cd604ea4b9f
-
Size
42KB
-
MD5
9119c48e34aa0b5b10732abb8a899377
-
SHA1
c5a0c2dc7507ade864018a783cf12587f6cfc8d6
-
SHA256
ddbf17981fed857e966ff809166b6d320e04d8527690090db8c51cd604ea4b9f
-
SHA512
1cd03786a39de37b9e087626ca1ddbb3b4f6e26e6d54c790d7035a6f9e7fb468d9b4186f86c6c58f86b769fee83afd7c88da18f73ec4c44567215fa11fd05945
-
SSDEEP
768:27kMNjYOabp0FkMt18Dt52g7wIA73uJEYpj+gsrwT+4q19TKfxUiPnBtlKdJ:2oe5ZFJ8p524ADuJJD9CHTK5UqB/Kd
Malware Config
Extracted
gozi_rm3
-
build
300854
Signatures
-
Gozi_rm3 family
Files
-
ddbf17981fed857e966ff809166b6d320e04d8527690090db8c51cd604ea4b9f.exe windows x86
c7f457269137f2e5ebe199ab9f32eada
Code Sign
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetCurrentThread
WaitForSingleObject
GetModuleHandleA
ExitProcess
lstrlenW
lstrlenA
HeapAlloc
HeapFree
CreateEventA
GetLastError
CloseHandle
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleW
GetSystemTimeAsFileTime
LoadLibraryW
GetProcAddress
ntdll
memcpy
memset
RtlUnwind
NtQueryVirtualMemory
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 740B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ