General
-
Target
dc75bc0a7aad28d157e5315008fb682158298ff710ede2c6ebcf5cd28b4aad36
-
Size
64KB
-
Sample
220201-kyhlnsbhak
-
MD5
c522850b1e78f5086200a969996d8f96
-
SHA1
8e4af2380b0080e828ed8432bb1482390cb264e0
-
SHA256
dc75bc0a7aad28d157e5315008fb682158298ff710ede2c6ebcf5cd28b4aad36
-
SHA512
e53362c46a78c9104f8a58be469b929cfa7468fd4bd4cbb32ca6f2c0517861be27f9dd639446044f09113d3976da931bf1586d6b3b7b12cc1dc6694e6b0b540b
Behavioral task
behavioral1
Sample
dc75bc0a7aad28d157e5315008fb682158298ff710ede2c6ebcf5cd28b4aad36.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dc75bc0a7aad28d157e5315008fb682158298ff710ede2c6ebcf5cd28b4aad36.dll
Resource
win10v2004-en-20220112
Malware Config
Extracted
gozi_ifsb
8899
http://microsoft.com.login/
https://premiumweare.com
https://gloverunomai.com
-
base_path
/glik/
-
build
260212
-
dga_season
10
-
exe_type
loader
-
extension
.lwe
-
server_id
12
Targets
-
-
Target
dc75bc0a7aad28d157e5315008fb682158298ff710ede2c6ebcf5cd28b4aad36
-
Size
64KB
-
MD5
c522850b1e78f5086200a969996d8f96
-
SHA1
8e4af2380b0080e828ed8432bb1482390cb264e0
-
SHA256
dc75bc0a7aad28d157e5315008fb682158298ff710ede2c6ebcf5cd28b4aad36
-
SHA512
e53362c46a78c9104f8a58be469b929cfa7468fd4bd4cbb32ca6f2c0517861be27f9dd639446044f09113d3976da931bf1586d6b3b7b12cc1dc6694e6b0b540b
Score8/10-
Sets service image path in registry
-