Behavioral task
behavioral1
Sample
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4.dll
Resource
win10v2004-en-20220113
General
-
Target
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4
-
Size
54KB
-
MD5
ba2cb9b75781ede9afab78924ab7a016
-
SHA1
cd781d469a0f8f52dcef5f75072c16b970e0e31e
-
SHA256
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4
-
SHA512
d0174240d9d396fdc8a3066959f569c830f7ef3915d33ad74491dfa1b78f23f155f73f23b71bf94f0dd5ad9d712e8530d434dee059c4d877ee01b40cc9951110
-
SSDEEP
1536:/dPXKZ+D9GwRCQc19qW7oKsLID2p+WyMp/O/cO:lPaZ+IwRCnuKsLID++WyMpm/c
Malware Config
Extracted
gozi_rm3
-
exe_type
loader
Extracted
gozi_rm3
201910301
https://jamesdrywall.xyz
-
build
300794
-
exe_type
loader
-
server_id
12
-
url_path
index.htm
Signatures
-
Gozi_rm3 family
-
Ursnif RM3 loader 1 IoCs
Detected the Ursnif RM3 loader, which is a heavily modified version of the Ursnif one.
resource yara_rule sample ursnif_rm3
Files
-
53e467867988f32cf3b0edf822755ddaa5264aa0e7be5bbaf4728754824219c4.dll windows x86
cdd0f2154e32ed5e0b51734142b86fcd
Code Sign
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_snprintf
sprintf
strchr
strcpy
memmove
NtCreateKey
NtDeleteValueKey
RtlInitUnicodeString
NtSetValueKey
NtQueryInformationToken
NtOpenProcessToken
NtClose
wcstombs
_allmul
_aulldiv
NtQueryInformationProcess
_wcsupr
NtQueryVirtualMemory
_snwprintf
RtlNtStatusToDosError
wcsrchr
memset
mbstowcs
RtlImageNtHeader
wcschr
memcpy
RtlUnwind
shlwapi
StrChrW
StrStrA
StrStrIW
StrChrA
StrStrIA
StrTrimA
ord176
PathCombineW
StrToIntExA
kernel32
VirtualAlloc
VirtualProtect
WaitForSingleObject
HeapCreate
CreateWaitableTimerA
lstrlenA
VirtualFree
CreateEventW
GetSystemTimeAsFileTime
Sleep
GetProcAddress
CreateWaitableTimerW
GetModuleHandleA
WaitForMultipleObjects
lstrlenW
SetWaitableTimer
CreateMutexW
lstrcatW
lstrcmpW
lstrcpyW
OpenProcess
InitializeCriticalSection
GetLastError
SetEvent
CloseHandle
SwitchToThread
EnterCriticalSection
lstrcpyA
ExpandEnvironmentStringsW
InterlockedIncrement
LeaveCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
GetComputerNameW
InterlockedDecrement
LoadLibraryA
ProcessIdToSessionId
CreateEventA
GetCurrentProcessId
ResetEvent
HeapAlloc
HeapFree
GetModuleFileNameW
MultiByteToWideChar
lstrcatA
user32
wsprintfW
wsprintfA
advapi32
OpenProcessToken
RegEnumKeyExW
GetUserNameW
GetSidSubAuthorityCount
RegCloseKey
GetTokenInformation
RegSetValueExW
GetSidSubAuthority
RegCreateKeyW
shell32
ShellExecuteW
ws2_32
inet_ntoa
inet_addr
winhttp
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpSetTimeouts
WinHttpQueryDataAvailable
WinHttpOpen
WinHttpOpenRequest
WinHttpSendRequest
WinHttpWriteData
WinHttpQueryOption
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpSetOption
dnsapi
DnsQuery_A
DnsFree
ole32
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CreateStreamOnHGlobal
CoInitializeEx
oleaut32
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayCreate
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ