Analysis

  • max time kernel
    111s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15/06/2022, 01:28

General

  • Target

    2ba3281b5ae981f0051176ad0f02b081245aace69910c9975f73754bbe98fcd4.exe

  • Size

    197KB

  • MD5

    9503ee67df12aa7906f1a37424a908c5

  • SHA1

    3569ed41cc1484f80259fe817c07d7834362309f

  • SHA256

    2ba3281b5ae981f0051176ad0f02b081245aace69910c9975f73754bbe98fcd4

  • SHA512

    6f5dd7fdb9133b0ec8648c67a1e1e5ea85c3ab2fafd9b614714f01acd2836e299c4c5994cc25c4eafba77f270562dc3b70d4faddef14cb0f08b4e6d584f0461e

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    215165

Extracted

Family

gozi_ifsb

Botnet

3135

C2

zweideckei.com

ziebelschr.com

endetztera.com

Attributes
  • build

    215165

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ba3281b5ae981f0051176ad0f02b081245aace69910c9975f73754bbe98fcd4.exe
    "C:\Users\Admin\AppData\Local\Temp\2ba3281b5ae981f0051176ad0f02b081245aace69910c9975f73754bbe98fcd4.exe"
    1⤵
      PID:1640

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1640-54-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB

          • memory/1640-55-0x0000000000400000-0x0000000000447000-memory.dmp

            Filesize

            284KB

          • memory/1640-56-0x0000000000260000-0x000000000027B000-memory.dmp

            Filesize

            108KB