General
-
Target
a3412d5e4378379ff6c48dc87652e2400b74e72b99bb2fad2498d21e4213010e
-
Size
52KB
-
Sample
220201-lkgynacha3
-
MD5
ff93684e156bb2a37e9615f9df7311d9
-
SHA1
67d862a7b7f4e3cd411dd9becb1d64190d6c5c48
-
SHA256
a3412d5e4378379ff6c48dc87652e2400b74e72b99bb2fad2498d21e4213010e
-
SHA512
92b9af32f167fd9fc214a07a7b541c405c8fb0bbe771c485ce45a87b45c6c3c24be401878fe77821ed3afca6ff10c956e9ed36f04342054cd1098aef11485569
Behavioral task
behavioral1
Sample
a3412d5e4378379ff6c48dc87652e2400b74e72b99bb2fad2498d21e4213010e.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a3412d5e4378379ff6c48dc87652e2400b74e72b99bb2fad2498d21e4213010e.dll
Resource
win10v2004-en-20220112
Malware Config
Extracted
gozi_ifsb
1500
authd.feronok.com
app.bighomegl.at
-
build
250204
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
a3412d5e4378379ff6c48dc87652e2400b74e72b99bb2fad2498d21e4213010e
-
Size
52KB
-
MD5
ff93684e156bb2a37e9615f9df7311d9
-
SHA1
67d862a7b7f4e3cd411dd9becb1d64190d6c5c48
-
SHA256
a3412d5e4378379ff6c48dc87652e2400b74e72b99bb2fad2498d21e4213010e
-
SHA512
92b9af32f167fd9fc214a07a7b541c405c8fb0bbe771c485ce45a87b45c6c3c24be401878fe77821ed3afca6ff10c956e9ed36f04342054cd1098aef11485569
Score8/10-
Sets service image path in registry
-