Analysis
-
max time kernel
48s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-06-2022 03:17
Static task
static1
Behavioral task
behavioral1
Sample
33379979fe354b26a88051f4cd28ce99a03a8e00a16764118c70b5a4b9397f56.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
33379979fe354b26a88051f4cd28ce99a03a8e00a16764118c70b5a4b9397f56.exe
-
Size
162KB
-
MD5
01002450f7df9f0b90056cfe330d3968
-
SHA1
400865a26d05900943d1e5e3a2347a52fc7fad7c
-
SHA256
33379979fe354b26a88051f4cd28ce99a03a8e00a16764118c70b5a4b9397f56
-
SHA512
481d46d1137533dc0fcb822c2ffd273e4990904543f2c6afa6a2d9a6de805f8d75f7368252a4f71fbb9a346304c8f0ab003df6572c3f59a04ab1052619d72754
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214107
Extracted
Family
gozi_ifsb
Botnet
3529
C2
gmail.com
google.com
nfyuabel.com
rwoodrowyioay.com
gqx21mcou.com
Attributes
-
build
214107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1652-55-0x0000000000C60000-0x0000000000C9B000-memory.dmpFilesize
236KB
-
memory/1652-54-0x0000000000C60000-0x0000000000C6E000-memory.dmpFilesize
56KB
-
memory/1652-56-0x0000000000100000-0x000000000010F000-memory.dmpFilesize
60KB
-
memory/1652-62-0x0000000000C60000-0x0000000000C9B000-memory.dmpFilesize
236KB
-
memory/1652-63-0x0000000000C60000-0x0000000000C9B000-memory.dmpFilesize
236KB