General
-
Target
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4
-
Size
54KB
-
Sample
220201-mescwacgfm
-
MD5
ba2cb9b75781ede9afab78924ab7a016
-
SHA1
cd781d469a0f8f52dcef5f75072c16b970e0e31e
-
SHA256
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4
-
SHA512
d0174240d9d396fdc8a3066959f569c830f7ef3915d33ad74491dfa1b78f23f155f73f23b71bf94f0dd5ad9d712e8530d434dee059c4d877ee01b40cc9951110
Behavioral task
behavioral1
Sample
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
gozi_rm3
-
exe_type
loader
Extracted
gozi_rm3
201910301
https://jamesdrywall.xyz
-
build
300794
-
exe_type
loader
-
server_id
12
-
url_path
index.htm
Targets
-
-
Target
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4
-
Size
54KB
-
MD5
ba2cb9b75781ede9afab78924ab7a016
-
SHA1
cd781d469a0f8f52dcef5f75072c16b970e0e31e
-
SHA256
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4
-
SHA512
d0174240d9d396fdc8a3066959f569c830f7ef3915d33ad74491dfa1b78f23f155f73f23b71bf94f0dd5ad9d712e8530d434dee059c4d877ee01b40cc9951110
Score8/10-
Sets service image path in registry
-