Static task
static1
Behavioral task
behavioral1
Sample
bc32f9b16563aadb226d17460dfcddb6947334f787259a088a90d52db2480742.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
bc32f9b16563aadb226d17460dfcddb6947334f787259a088a90d52db2480742.exe
Resource
win10v2004-en-20220113
General
-
Target
bc32f9b16563aadb226d17460dfcddb6947334f787259a088a90d52db2480742
-
Size
52KB
-
MD5
252d27476b5485e886a398bf55dbeee0
-
SHA1
26945df892b0202723b1071bdde4ff9ea3f6c58c
-
SHA256
bc32f9b16563aadb226d17460dfcddb6947334f787259a088a90d52db2480742
-
SHA512
03a152ab783d25619cc38c732986cbbb7056c181e86bc65b924c51ebd7ef8b541b43457d9242c15b5334111f9f8ac16c0fd6517946ff8abab0a15574bfca97a4
-
SSDEEP
1536:pHm68dMJPt0Jwu7GI8KHzuZ19E1P/BEZkcnPd:x9869KwvsuZXenUkE
Malware Config
Extracted
gozi_rm3
-
build
300904
Signatures
-
Gozi_rm3 family
Files
-
bc32f9b16563aadb226d17460dfcddb6947334f787259a088a90d52db2480742.exe windows x86
76782c4ef82c16a64a1726ab56e5524c
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetCurrentThread
WaitForSingleObject
GetModuleHandleA
ExitProcess
CreateEventA
GetLastError
CloseHandle
lstrlenA
HeapAlloc
HeapFree
lstrlenW
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleW
GetSystemTimeAsFileTime
LoadLibraryW
GetProcAddress
ntdll
memset
memcpy
RtlUnwind
NtQueryVirtualMemory
Sections
.text Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 45KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ