Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 05:06
Static task
static1
Behavioral task
behavioral1
Sample
2279d9e137e8177e15950e2b8dcbbaf07779a9da8033875d3b41016a535dca96.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
2279d9e137e8177e15950e2b8dcbbaf07779a9da8033875d3b41016a535dca96.exe
-
Size
372KB
-
MD5
dc0d61bcc1e38db01bca0ba5053242f2
-
SHA1
66e7c4893f28178ce091b31d3a9aa3aa628f868c
-
SHA256
2279d9e137e8177e15950e2b8dcbbaf07779a9da8033875d3b41016a535dca96
-
SHA512
1b3f59e55b51b7307cd54fb34591c0e73feb8696552171a0ba8e1614a2b6b66d60d70c692da372981c4c1aec33eec28b1cb59cbfc78850e7f5629acb7d2b9ae9
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214062
Extracted
Family
gozi_ifsb
Botnet
3181
C2
bm25yp.com
xiivhaaou.email
m264591jasen.city
Attributes
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/908-54-0x0000000075B61000-0x0000000075B63000-memory.dmpFilesize
8KB
-
memory/908-56-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/908-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/908-57-0x00000000002B0000-0x00000000002CB000-memory.dmpFilesize
108KB