Analysis

  • max time kernel
    30s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12/06/2022, 23:14

General

  • Target

    1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2.exe

  • Size

    547KB

  • MD5

    a54a06ea97d9c828b6620d9724ada118

  • SHA1

    a38fea31427c2b344d73da3f0c1df9c037dfc038

  • SHA256

    1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2

  • SHA512

    87a39f6acb6b0d7bc705c9d5ccbb3dca9fb7fe341b63661b8141cae8eadfadd6eb883634fcd8b478848950fedee2c51c056acb78e98448c379082f8f371b7a69

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214062

Extracted

Family

gozi_ifsb

Botnet

3187

C2

qrodericky94.company

g77yelsao.company

tromainevirginia.email

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2.exe
    "C:\Users\Admin\AppData\Local\Temp\1dd7ac6483f6e0a00763e9fc457411f369bf0ec586b1e5ce5667663256c146d2.exe"
    1⤵
      PID:4052

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4052-130-0x00000000002E0000-0x00000000002EF000-memory.dmp

            Filesize

            60KB

          • memory/4052-131-0x00000000002E0000-0x000000000037E000-memory.dmp

            Filesize

            632KB

          • memory/4052-132-0x0000000002CC0000-0x0000000002CDB000-memory.dmp

            Filesize

            108KB