Behavioral task
behavioral1
Sample
305f2634325220221d799665a2386f67236f6602158b0ff4957b6a8c5a90f4bd.dll
Resource
win7-20220414-en
General
-
Target
305f2634325220221d799665a2386f67236f6602158b0ff4957b6a8c5a90f4bd
-
Size
186KB
-
MD5
6fcf9b1fea714dfc586bbe8bf638c2a4
-
SHA1
5307be00240a539c135116931f1a003124dd13ab
-
SHA256
305f2634325220221d799665a2386f67236f6602158b0ff4957b6a8c5a90f4bd
-
SHA512
468d0069c4fdf2759043663443453eb590355d99dd58a16041fd0095ff8cfd0bfea9ad52aaed89e621753de751e046141e125571b8180bdfc68f01cc6495ad98
-
SSDEEP
3072:cA36vaKOnDW0mmHeQMZb85xPLs7zEVoCHVIrsD3WG6Lu2qlalXn6WisGacve89jQ:cA3gaK4DHAZb8vs7zIoCGrsbqu2qlal5
Malware Config
Extracted
gozi_ifsb
2000
api2.doter.at/webstore
beetfeetlife.bit/webstore
in.extermas.at/webstore
d6djf2vtjv5kowow.onion/webstore
asx.zaronif.at/webstore
g2.ex100p.at/webstore
gif.doter.at/webstore
extra.avareg.cn/webstore
vo5vuw5tdkqetax4.onion/webstore
foo.avaregio.at/webstore
op.iovbased.at/webstore
ws.doter.at/webstore
f1.cnboal.at/webstore
zq4aggr2i6hmklgd.onion/webstore
xxx.doolap.at/webstore
-
build
217050
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
dns_servers
51.255.48.78
8.8.8.8
192.71.245.208
178.17.170.179
193.183.98.66
207.148.83.241
111.67.20.8
103.236.162.119
142.4.205.47
213.136.85.253
159.89.249.249
82.196.9.45
-
exe_type
worker
-
server_id
550
Signatures
-
Gozi_ifsb family
Files
-
305f2634325220221d799665a2386f67236f6602158b0ff4957b6a8c5a90f4bd.dll windows x86
3c95b2d730ddee88d3f32d275de0dfcb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_snprintf
NtCreateSection
NtMapViewOfSection
NtUnmapViewOfSection
ZwClose
ZwQueryInformationToken
ZwOpenProcessToken
ZwOpenProcess
strcpy
RtlNtStatusToDosError
NtQuerySystemInformation
ZwQueryInformationProcess
mbstowcs
_wcsupr
_strupr
memmove
memset
wcscpy
ZwQueryKey
RtlFreeUnicodeString
RtlUpcaseUnicodeString
wcstombs
memcpy
RtlImageNtHeader
RtlAdjustPrivilege
sprintf
_aulldiv
_allmul
_chkstk
RtlUnwind
NtQueryVirtualMemory
kernel32
QueueUserWorkItem
ExpandEnvironmentStringsA
FindFirstFileA
GetFileTime
FindNextFileA
CompareFileTime
Wow64EnableWow64FsRedirection
QueryPerformanceCounter
QueryPerformanceFrequency
GetModuleFileNameW
GetModuleFileNameA
CreateDirectoryA
HeapAlloc
CloseHandle
GetLastError
RemoveDirectoryA
HeapFree
DeleteFileA
LoadLibraryA
lstrcpyA
CreateFileA
lstrcatA
lstrlenA
WriteFile
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
HeapDestroy
HeapCreate
SetEvent
HeapReAlloc
GetCommandLineW
GetCurrentThreadId
DuplicateHandle
SetWaitableTimer
Sleep
GetTickCount
CopyFileW
GetCurrentThread
lstrlenW
CreateEventA
DeleteFileW
GetWindowsDirectoryA
InterlockedExchange
GetTempPathA
CreateDirectoryW
SuspendThread
ResumeThread
WaitForSingleObject
lstrcpyW
lstrcmpiW
GetModuleHandleA
OpenProcess
CreateThread
SwitchToThread
lstrcatW
CreateFileW
ExitProcess
WaitForMultipleObjects
SetLastError
lstrcmpiA
CreateMutexA
ResetEvent
lstrcmpA
OpenWaitableTimerA
OpenMutexA
ReleaseMutex
VirtualProtectEx
UnmapViewOfFile
CreateWaitableTimerA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
RegisterWaitForSingleObject
TlsGetValue
TlsSetValue
LoadLibraryExW
VirtualAlloc
VirtualProtect
UnregisterWait
TlsAlloc
OpenEventA
GetProcAddress
GetDriveTypeW
WideCharToMultiByte
OpenFileMappingA
LocalFree
GetLogicalDriveStringsW
GetExitCodeProcess
CreateFileMappingA
GetFileSize
lstrcpynA
CreateToolhelp32Snapshot
QueueUserAPC
Thread32First
OpenThread
Thread32Next
ReadFile
CancelIo
ConnectNamedPipe
GetOverlappedResult
DisconnectNamedPipe
GetSystemTime
FlushFileBuffers
CreateNamedPipeA
CallNamedPipeA
WaitNamedPipeA
AddVectoredExceptionHandler
SleepEx
RemoveVectoredExceptionHandler
ExitThread
LocalAlloc
FreeLibrary
RaiseException
IsWow64Process
GetLocalTime
VirtualFree
GetCurrentProcessId
GetVersion
DeleteCriticalSection
RemoveDirectoryW
GetTempFileNameA
SetEndOfFile
ExpandEnvironmentStringsW
SetFilePointer
FindNextFileW
FindClose
GetFileAttributesW
SetFilePointerEx
FindFirstFileW
GetComputerNameW
MapViewOfFile
CreateProcessA
GetVersionExA
dnsapi
DnsQuery_A
DnsFree
Sections
.text Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ