General
-
Target
13aaa7f57cb8c683698676570375343c86c95710b96eff749019d3340fbe8c69
-
Size
43KB
-
Sample
220201-mzjapsdcar
-
MD5
6084e9e529c3ad20878e4d7e7319636e
-
SHA1
37504e97dc44659234f2461a3c369e3c393a53fa
-
SHA256
13aaa7f57cb8c683698676570375343c86c95710b96eff749019d3340fbe8c69
-
SHA512
46b0db1d8b04fe4b3173de0c4c5b64b52049b9146dbbfff0a92c9c8992e3896c23868a72f313ad12250cc83022177a40f2358ec0189952577d3e95d7d29403da
Behavioral task
behavioral1
Sample
13aaa7f57cb8c683698676570375343c86c95710b96eff749019d3340fbe8c69.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
13aaa7f57cb8c683698676570375343c86c95710b96eff749019d3340fbe8c69.dll
Resource
win10v2004-en-20220112
Malware Config
Extracted
gozi_ifsb
3300
api10.laptok.at/api1
-
build
250155
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
730
Targets
-
-
Target
13aaa7f57cb8c683698676570375343c86c95710b96eff749019d3340fbe8c69
-
Size
43KB
-
MD5
6084e9e529c3ad20878e4d7e7319636e
-
SHA1
37504e97dc44659234f2461a3c369e3c393a53fa
-
SHA256
13aaa7f57cb8c683698676570375343c86c95710b96eff749019d3340fbe8c69
-
SHA512
46b0db1d8b04fe4b3173de0c4c5b64b52049b9146dbbfff0a92c9c8992e3896c23868a72f313ad12250cc83022177a40f2358ec0189952577d3e95d7d29403da
Score10/10-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Sets service image path in registry
-