Analysis

  • max time kernel
    32s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    16-06-2022 07:32

General

  • Target

    26ba77d5e7613435119013883f0e7c27b01d7fb6e87fb1d931534059f0824c23.exe

  • Size

    376KB

  • MD5

    6440c22549e3773529aae541a831e0ef

  • SHA1

    d5ee8d4493e6f488ffc04e899152c880474a50d6

  • SHA256

    26ba77d5e7613435119013883f0e7c27b01d7fb6e87fb1d931534059f0824c23

  • SHA512

    1aeb214f603960de7060e0c456b4709582e20546aacbc46fd3ca81e92884d125904bb05f1b5032f4acde8eb2fdebc142becec26aa4a078174882f4eefc87c94a

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3195

C2

nsyblefgg.city

m25lni11528.com

dgrover.band

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\26ba77d5e7613435119013883f0e7c27b01d7fb6e87fb1d931534059f0824c23.exe
    "C:\Users\Admin\AppData\Local\Temp\26ba77d5e7613435119013883f0e7c27b01d7fb6e87fb1d931534059f0824c23.exe"
    1⤵
      PID:1680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1680-54-0x00000000752B1000-0x00000000752B3000-memory.dmp
      Filesize

      8KB

    • memory/1680-55-0x0000000000D90000-0x0000000000D9F000-memory.dmp
      Filesize

      60KB

    • memory/1680-56-0x0000000000D90000-0x0000000000DFF000-memory.dmp
      Filesize

      444KB

    • memory/1680-57-0x0000000000260000-0x000000000027B000-memory.dmp
      Filesize

      108KB