Behavioral task
behavioral1
Sample
79d05091b567d313993b547eb379119a1e00bb0cb6716f932a1f1bf7f0058695.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
79d05091b567d313993b547eb379119a1e00bb0cb6716f932a1f1bf7f0058695.dll
Resource
win10v2004-en-20220113
General
-
Target
79d05091b567d313993b547eb379119a1e00bb0cb6716f932a1f1bf7f0058695
-
Size
145KB
-
MD5
3170f0ed199177fc13d6a86e7a6b0bb3
-
SHA1
e79195224a6fbf4bd6a442add27f25029317b08b
-
SHA256
79d05091b567d313993b547eb379119a1e00bb0cb6716f932a1f1bf7f0058695
-
SHA512
54f03f11b4d76e6ce3928a70c53942370ca23b8bd2c2d2f92079272a031deafe5187b3e7ef57b45e3374c36b3e9a10a4d3c40bec85bc2f8ada701c58ec0b55a3
-
SSDEEP
3072:U9MfvS8o2a/wSpiED+hqlalXnmdU09UY+kyGOUruRyipj:2wvS8RMD8qlalMZ+kGU
Malware Config
Extracted
gozi_ifsb
1071
127.0.0.1
-
exe_type
worker
-
server_id
12
Signatures
-
Gozi_ifsb family
Files
-
79d05091b567d313993b547eb379119a1e00bb0cb6716f932a1f1bf7f0058695.dll windows x86
ac88675716581bc592ffd8c4356d4cce
Code Sign
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwOpenProcess
ZwOpenProcessToken
ZwQueryInformationToken
ZwClose
NtUnmapViewOfSection
NtMapViewOfSection
NtCreateSection
RtlNtStatusToDosError
NtQuerySystemInformation
RtlAdjustPrivilege
_wcsupr
_strupr
wcscpy
memset
ZwQueryKey
RtlFreeUnicodeString
RtlUpcaseUnicodeString
sprintf
_snprintf
wcstombs
strcpy
mbstowcs
RtlImageNtHeader
memcpy
ZwQueryInformationProcess
_aulldiv
_allmul
_alldiv
RtlUnwind
NtQueryVirtualMemory
kernel32
GetProcAddress
FileTimeToLocalFileTime
SystemTimeToFileTime
GetModuleFileNameW
FileTimeToSystemTime
GetModuleFileNameA
OpenProcess
GetLocalTime
CreateRemoteThread
VirtualFree
DeleteCriticalSection
SetEndOfFile
ExpandEnvironmentStringsW
SetFilePointer
CreateDirectoryA
GetLastError
HeapAlloc
CloseHandle
RemoveDirectoryA
LocalFree
HeapFree
LoadLibraryA
DeleteFileA
lstrcpyA
LocalAlloc
CreateFileA
lstrcatA
lstrlenA
WriteFile
OutputDebugStringA
InterlockedDecrement
HeapDestroy
HeapCreate
SetEvent
HeapReAlloc
GetCurrentThreadId
GetTickCount
GetCurrentProcessId
InterlockedIncrement
lstrcpyW
GetCurrentThread
CreateEventA
CreateThread
SetWaitableTimer
SwitchToThread
GetSystemTimeAsFileTime
lstrcatW
GetWindowsDirectoryA
CreateDirectoryW
CreateFileW
DeleteFileW
GetTempPathA
Sleep
lstrlenW
CopyFileW
SuspendThread
ResumeThread
MapViewOfFile
EnterCriticalSection
UnmapViewOfFile
CreateMutexA
OpenWaitableTimerA
OpenMutexA
ReleaseMutex
CreateWaitableTimerA
GetSystemTime
WaitForSingleObject
GetComputerNameW
lstrcmpA
SetLastError
lstrcmpiA
WaitForMultipleObjects
LeaveCriticalSection
InitializeCriticalSection
VirtualAlloc
VirtualProtect
UnregisterWait
RegisterWaitForSingleObject
LoadLibraryExW
InterlockedExchange
GetModuleHandleA
FindFirstFileW
GetFileAttributesA
GetExitCodeProcess
GetFileAttributesW
CreateFileMappingA
CreateProcessA
GetFileSize
GetDriveTypeW
WideCharToMultiByte
OpenFileMappingA
GetLogicalDriveStringsW
lstrcpynA
TlsGetValue
TlsSetValue
TlsAlloc
GlobalUnlock
GetLongPathNameW
GlobalLock
QueueUserAPC
Thread32First
OpenThread
Thread32Next
CreateToolhelp32Snapshot
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
CallNamedPipeA
WaitNamedPipeA
ReadFile
CancelIo
ConnectNamedPipe
GetOverlappedResult
AddVectoredExceptionHandler
OpenEventA
SleepEx
RemoveVectoredExceptionHandler
ResetEvent
FreeLibrary
RaiseException
FindNextFileW
RemoveDirectoryW
FindClose
GetTempFileNameA
GetVersion
VirtualProtectEx
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ