Analysis
-
max time kernel
48s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 22:57
Static task
static1
Behavioral task
behavioral1
Sample
2f461cd9fecdcd30c143fa3ed806df48bb8ac83a0b48c1ec2ce01a151b98c288.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
2f461cd9fecdcd30c143fa3ed806df48bb8ac83a0b48c1ec2ce01a151b98c288.exe
-
Size
372KB
-
MD5
77fb2e909a16b8ed3ac72e42d92d1530
-
SHA1
78052938246f5fc0ba52e21f79bd454a704e911c
-
SHA256
2f461cd9fecdcd30c143fa3ed806df48bb8ac83a0b48c1ec2ce01a151b98c288
-
SHA512
2efcf98032057bbf9bef59121c6c6db80c47f590d45f96208095992aa4d71d833cb9fca17481287e45a2327defc39383bb715ed90f6ed9c58ea07f1416f748cb
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214062
Extracted
Family
gozi_ifsb
Botnet
3181
C2
bm25yp.com
xiivhaaou.email
m264591jasen.city
Attributes
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1464-54-0x0000000074B51000-0x0000000074B53000-memory.dmpFilesize
8KB
-
memory/1464-56-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1464-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1464-57-0x0000000000370000-0x000000000038B000-memory.dmpFilesize
108KB