General
-
Target
41ecaa19029cb0c7e9b2c4ba8ccf7fd070176d5f2d1217bcc9503d85a74a72f2
-
Size
44KB
-
Sample
220201-mkap1sddh7
-
MD5
2a70d887942ab82210a62704c99913aa
-
SHA1
bcca694eafd4dc72ada020014fbdd4285e91d391
-
SHA256
41ecaa19029cb0c7e9b2c4ba8ccf7fd070176d5f2d1217bcc9503d85a74a72f2
-
SHA512
512c8089409cc7ddb8fbb3858228e44a283d73c49cbf5c2973716bc15c75539fd0b4c838f0c577d219406c749be9e14337a059b3e48467625055f5664b12e343
Behavioral task
behavioral1
Sample
41ecaa19029cb0c7e9b2c4ba8ccf7fd070176d5f2d1217bcc9503d85a74a72f2.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
41ecaa19029cb0c7e9b2c4ba8ccf7fd070176d5f2d1217bcc9503d85a74a72f2.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
gozi_ifsb
3300
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
-
build
250171
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
730
Targets
-
-
Target
41ecaa19029cb0c7e9b2c4ba8ccf7fd070176d5f2d1217bcc9503d85a74a72f2
-
Size
44KB
-
MD5
2a70d887942ab82210a62704c99913aa
-
SHA1
bcca694eafd4dc72ada020014fbdd4285e91d391
-
SHA256
41ecaa19029cb0c7e9b2c4ba8ccf7fd070176d5f2d1217bcc9503d85a74a72f2
-
SHA512
512c8089409cc7ddb8fbb3858228e44a283d73c49cbf5c2973716bc15c75539fd0b4c838f0c577d219406c749be9e14337a059b3e48467625055f5664b12e343
Score8/10-
Sets service image path in registry
-