General
-
Target
1652-57-0x0000000000260000-0x000000000026E000-memory.dmp
-
Size
56KB
-
Sample
220318-s57s5sbeep
-
MD5
e69a04e3656a3f1c82f72835aad69005
-
SHA1
81a1ad61dbc6fb666b1c86fc2555b4c3b91662a9
-
SHA256
6e981f4c8050300894b5a7e41ba18b471de5063485a67a40423a62a8cd1665a0
-
SHA512
939c95fcdf86567ecff633d8325f25ca3dfd47b76450440de5558ba0a956f39e75f443d119a8f8afbe098924c73330cf896a5f04f0849fe6bb822d5ed4a0f214
Behavioral task
behavioral1
Sample
1652-57-0x0000000000260000-0x000000000026E000-memory.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1652-57-0x0000000000260000-0x000000000026E000-memory.dll
Resource
win10v2004-en-20220113
Malware Config
Extracted
gozi_ifsb
7625
sistemliner.top
linkspremium.ru
premiumlists.ru
-
base_path
/drew/
-
build
250225
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
1652-57-0x0000000000260000-0x000000000026E000-memory.dmp
-
Size
56KB
-
MD5
e69a04e3656a3f1c82f72835aad69005
-
SHA1
81a1ad61dbc6fb666b1c86fc2555b4c3b91662a9
-
SHA256
6e981f4c8050300894b5a7e41ba18b471de5063485a67a40423a62a8cd1665a0
-
SHA512
939c95fcdf86567ecff633d8325f25ca3dfd47b76450440de5558ba0a956f39e75f443d119a8f8afbe098924c73330cf896a5f04f0849fe6bb822d5ed4a0f214
Score3/10 -