General
-
Target
113376c683b2f1abcf3f27e5588deeb2bc93e6e4818fb7261e4e16d2ea12e24d
-
Size
258KB
-
Sample
220604-j1er5aeeh5
-
MD5
5bb4b640ca45c233fb33d2d3fc35f9ef
-
SHA1
7ed8828c6b85f5a6a417d498da20e47708ef7010
-
SHA256
113376c683b2f1abcf3f27e5588deeb2bc93e6e4818fb7261e4e16d2ea12e24d
-
SHA512
8d643ca1555cab397a312742a1d7b441279a7a99519261cbef76e1be641ac4dec262aa83245b8c95705955319d2e80617ee79bf8dba535a67f87ff899b2da949
Static task
static1
Behavioral task
behavioral1
Sample
113376c683b2f1abcf3f27e5588deeb2bc93e6e4818fb7261e4e16d2ea12e24d.exe
Resource
win7-20220414-en
Malware Config
Extracted
gozi_ifsb
2000
beetfeetlife.bit/webstore
api.sorna.at/webstore
supp.rivier.at/webstore
-
build
217072
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
dns_servers
193.183.98.66
91.217.137.37
192.71.245.208
8.8.8.8
178.17.170.179
82.196.9.45
151.80.222.79
68.183.70.217
217.144.135.7
158.69.160.164
207.148.83.241
5.189.170.196
217.144.132.148
94.247.43.254
188.165.200.156
159.89.249.249
150.249.149.222
-
exe_type
loader
-
server_id
550
Targets
-
-
Target
113376c683b2f1abcf3f27e5588deeb2bc93e6e4818fb7261e4e16d2ea12e24d
-
Size
258KB
-
MD5
5bb4b640ca45c233fb33d2d3fc35f9ef
-
SHA1
7ed8828c6b85f5a6a417d498da20e47708ef7010
-
SHA256
113376c683b2f1abcf3f27e5588deeb2bc93e6e4818fb7261e4e16d2ea12e24d
-
SHA512
8d643ca1555cab397a312742a1d7b441279a7a99519261cbef76e1be641ac4dec262aa83245b8c95705955319d2e80617ee79bf8dba535a67f87ff899b2da949
-