Static task
static1
Behavioral task
behavioral1
Sample
a36548eea4f8f9ef285d6677d55fa2eb4bbff386d05e4f513adf66bc1a6a2dba.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a36548eea4f8f9ef285d6677d55fa2eb4bbff386d05e4f513adf66bc1a6a2dba.exe
Resource
win10v2004-en-20220113
General
-
Target
a36548eea4f8f9ef285d6677d55fa2eb4bbff386d05e4f513adf66bc1a6a2dba
-
Size
43KB
-
MD5
4901423fddb54a564f9ee0a243c91674
-
SHA1
5c4e62ffaf841fb25c4a936144b58cc6cfbadaba
-
SHA256
a36548eea4f8f9ef285d6677d55fa2eb4bbff386d05e4f513adf66bc1a6a2dba
-
SHA512
f6f72ea7fa06c3c7fb5b4cfbf2754381138a43b07b186252ac8edb2d5a3ccc3c04a8a3d002d727cd8893767bf2e15c6ca03bbcbe1c8fab3183897a4dc3ff555e
-
SSDEEP
768:/BkMMtNGDabW1I9q9+I1StZHM3uqF1PnRIFRKHm/tj0cgKIIU24g6dUt3zKXgYq:/m7ODb1I9q9+kSt1M7k2G14Kg24g5zC
Malware Config
Extracted
gozi_rm3
-
build
300854
Signatures
-
Gozi_rm3 family
Files
-
a36548eea4f8f9ef285d6677d55fa2eb4bbff386d05e4f513adf66bc1a6a2dba.exe windows x86
c7f457269137f2e5ebe199ab9f32eada
Code Sign
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetCurrentThread
WaitForSingleObject
GetModuleHandleA
ExitProcess
lstrlenW
lstrlenA
HeapAlloc
HeapFree
CreateEventA
GetLastError
CloseHandle
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleW
GetSystemTimeAsFileTime
LoadLibraryW
GetProcAddress
ntdll
memcpy
memset
RtlUnwind
NtQueryVirtualMemory
Sections
.text Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.SCY Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE