General
-
Target
339d1ee2a0cc5fa4ae29fcf5786c4d39b4566d03107fa70d90ed97d0db634ffc
-
Size
908KB
-
Sample
220524-2tpb4aagf5
-
MD5
2360d0cb63e652f2859e8e7b2e052fad
-
SHA1
d350ac06424a7e5cdf9fc1d29474652e2a5c3376
-
SHA256
339d1ee2a0cc5fa4ae29fcf5786c4d39b4566d03107fa70d90ed97d0db634ffc
-
SHA512
8bc369c618b688bd1abc063bd5ac8a73bdcb9143e04288b1b151fb909d8066ba8e489ad6c76b290e2f3354023b8f8c1dc48dec58896a3cc4f71f2ad3a848aebe
Behavioral task
behavioral1
Sample
339d1ee2a0cc5fa4ae29fcf5786c4d39b4566d03107fa70d90ed97d0db634ffc.exe
Resource
win7-20220414-en
Malware Config
Extracted
gozi_rm3
-
build
300854
Extracted
gozi_rm3
202004141
https://devicelease.xyz
-
build
300854
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
-
url_path
index.htm
Targets
-
-
Target
339d1ee2a0cc5fa4ae29fcf5786c4d39b4566d03107fa70d90ed97d0db634ffc
-
Size
908KB
-
MD5
2360d0cb63e652f2859e8e7b2e052fad
-
SHA1
d350ac06424a7e5cdf9fc1d29474652e2a5c3376
-
SHA256
339d1ee2a0cc5fa4ae29fcf5786c4d39b4566d03107fa70d90ed97d0db634ffc
-
SHA512
8bc369c618b688bd1abc063bd5ac8a73bdcb9143e04288b1b151fb909d8066ba8e489ad6c76b290e2f3354023b8f8c1dc48dec58896a3cc4f71f2ad3a848aebe
-