Analysis

  • max time kernel
    40s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14/06/2022, 23:43

General

  • Target

    2c24a8334bb87918e5c41eff8300b8e5753c46a8583b458108c86aec0303bb9f.exe

  • Size

    372KB

  • MD5

    605d4ac721219ba694155111aa31c48c

  • SHA1

    caac75547a8346197f7a3a52b401eb92cedc3704

  • SHA256

    2c24a8334bb87918e5c41eff8300b8e5753c46a8583b458108c86aec0303bb9f

  • SHA512

    9f1aeabcd8d79bcc7b8cb8e2916d9a64b1a92c4d080abefbb6b36439dba8c504a3db78308468c79f6c68181dea128e8a175524692578b6fa69ec19bab713184b

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214062

Extracted

Family

gozi_ifsb

Botnet

3181

C2

bm25yp.com

xiivhaaou.email

m264591jasen.city

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c24a8334bb87918e5c41eff8300b8e5753c46a8583b458108c86aec0303bb9f.exe
    "C:\Users\Admin\AppData\Local\Temp\2c24a8334bb87918e5c41eff8300b8e5753c46a8583b458108c86aec0303bb9f.exe"
    1⤵
      PID:2920

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2920-130-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB

          • memory/2920-131-0x0000000000400000-0x000000000046D000-memory.dmp

            Filesize

            436KB

          • memory/2920-132-0x0000000002230000-0x000000000224B000-memory.dmp

            Filesize

            108KB