General
-
Target
request.doc
-
Size
526KB
-
Sample
220407-syya5aaad2
-
MD5
2f66e607c3dc705034713fa5ae67bb9d
-
SHA1
2fc6a71d0b3298e59852b57f27b2b24bfbc25d32
-
SHA256
2f206f6c5b458da0a0ed4057780d8c90c00cd0f8e31846ab626d55331e81b614
-
SHA512
8189dec15803be9ec0aa56db832450177dcbad48477096280b6c1b961a56aadcf127ef335f31daaf25b1c6b54869d76ffb46772acd9fce59caaf342a7b6ec7f4
Static task
static1
Malware Config
Extracted
gozi_rm3
-
build
300994
Targets
-
-
Target
request.doc
-
Size
526KB
-
MD5
2f66e607c3dc705034713fa5ae67bb9d
-
SHA1
2fc6a71d0b3298e59852b57f27b2b24bfbc25d32
-
SHA256
2f206f6c5b458da0a0ed4057780d8c90c00cd0f8e31846ab626d55331e81b614
-
SHA512
8189dec15803be9ec0aa56db832450177dcbad48477096280b6c1b961a56aadcf127ef335f31daaf25b1c6b54869d76ffb46772acd9fce59caaf342a7b6ec7f4
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
Drops file in System32 directory
-