General
-
Target
1828-56-0x00000000001B0000-0x00000000001BE000-memory.dmp
-
Size
56KB
-
Sample
220318-jr2kjageg2
-
MD5
b8e4f38650912b7986118c969417d288
-
SHA1
6eb34613fdd59ed06130ed5011f5dcaa6a9e3341
-
SHA256
a120212d83550d08982aabc8af214cd596b69b54d71dee0e493046b3034871aa
-
SHA512
a0c2f037cd9f4c78e5e2865efdffea6ba0d9892c04f73f70d2d77c7e51130c139ee4701ae2731ba7676959e96f896610633f59d68df34505c8d94ef453fa0d2d
Behavioral task
behavioral1
Sample
1828-56-0x00000000001B0000-0x00000000001BE000-memory.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1828-56-0x00000000001B0000-0x00000000001BE000-memory.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
gozi_ifsb
7625
sistemliner.top
linkspremium.ru
premiumlists.ru
-
base_path
/drew/
-
build
250225
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
1828-56-0x00000000001B0000-0x00000000001BE000-memory.dmp
-
Size
56KB
-
MD5
b8e4f38650912b7986118c969417d288
-
SHA1
6eb34613fdd59ed06130ed5011f5dcaa6a9e3341
-
SHA256
a120212d83550d08982aabc8af214cd596b69b54d71dee0e493046b3034871aa
-
SHA512
a0c2f037cd9f4c78e5e2865efdffea6ba0d9892c04f73f70d2d77c7e51130c139ee4701ae2731ba7676959e96f896610633f59d68df34505c8d94ef453fa0d2d
Score3/10 -