Analysis

  • max time kernel
    23s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12/06/2022, 23:14

General

  • Target

    1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2.exe

  • Size

    547KB

  • MD5

    a54a06ea97d9c828b6620d9724ada118

  • SHA1

    a38fea31427c2b344d73da3f0c1df9c037dfc038

  • SHA256

    1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2

  • SHA512

    87a39f6acb6b0d7bc705c9d5ccbb3dca9fb7fe341b63661b8141cae8eadfadd6eb883634fcd8b478848950fedee2c51c056acb78e98448c379082f8f371b7a69

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214062

Extracted

Family

gozi_ifsb

Botnet

3187

C2

qrodericky94.company

g77yelsao.company

tromainevirginia.email

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2.exe
    "C:\Users\Admin\AppData\Local\Temp\1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2.exe"
    1⤵
      PID:784

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/784-54-0x0000000076391000-0x0000000076393000-memory.dmp

            Filesize

            8KB

          • memory/784-56-0x0000000000160000-0x00000000001FE000-memory.dmp

            Filesize

            632KB

          • memory/784-55-0x0000000000160000-0x000000000016F000-memory.dmp

            Filesize

            60KB

          • memory/784-57-0x0000000000110000-0x000000000012B000-memory.dmp

            Filesize

            108KB