Analysis
-
max time kernel
40s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
31-05-2022 06:31
Static task
static1
Behavioral task
behavioral1
Sample
064b8a875dee469a66cb8a0ecd4c12648096ba2cdb2cd2b7923eea208313913a.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
064b8a875dee469a66cb8a0ecd4c12648096ba2cdb2cd2b7923eea208313913a.exe
-
Size
372KB
-
MD5
d8fbbd844af32c6968072a1cbd04791b
-
SHA1
5ae8ea5f1143eccc1f4d068b63b511e4b24c9cae
-
SHA256
064b8a875dee469a66cb8a0ecd4c12648096ba2cdb2cd2b7923eea208313913a
-
SHA512
c7d00283598215bfedf8dbbe67aa4a22242843d9fb012f600b18401d1a1c5369a9e199ade381ad6f0be388351fcbe11c6a3ac9687652d7a4540d787f92fe75f0
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214062
Extracted
Family
gozi_ifsb
Botnet
3181
C2
bm25yp.com
xiivhaaou.email
m264591jasen.city
Attributes
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1448-54-0x0000000075C51000-0x0000000075C53000-memory.dmpFilesize
8KB
-
memory/1448-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1448-56-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1448-57-0x0000000000620000-0x000000000063B000-memory.dmpFilesize
108KB