General
-
Target
app.exe
-
Size
270KB
-
Sample
220204-kfpl9sfhhr
-
MD5
2d752f0b4e5c40e3997bce76f9ce76ec
-
SHA1
28df0b35684a783abaa3de7964470cc062010b45
-
SHA256
681dbf5bd80611418b92e07abe790dbb7fc9fbe9898b7b214598c3865e2ac1d9
-
SHA512
d0ed36044ebb40c3a9d01da7dd143b41746a29491062ab8c361ff8a2ad4559870f4ac9dd82c977e929f123008253d92feb2e5815a182ea7560c6593a731178ca
Static task
static1
Behavioral task
behavioral1
Sample
app.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
app.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
gozi_ifsb
7610
maybommpump.top
linkspremium.ru
premiumlists.ru
premiumlinks.top
-
base_path
/drew/
-
build
250225
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
app.exe
-
Size
270KB
-
MD5
2d752f0b4e5c40e3997bce76f9ce76ec
-
SHA1
28df0b35684a783abaa3de7964470cc062010b45
-
SHA256
681dbf5bd80611418b92e07abe790dbb7fc9fbe9898b7b214598c3865e2ac1d9
-
SHA512
d0ed36044ebb40c3a9d01da7dd143b41746a29491062ab8c361ff8a2ad4559870f4ac9dd82c977e929f123008253d92feb2e5815a182ea7560c6593a731178ca
-