General
-
Target
3064-131-0x0000000000520000-0x000000000052F000-memory.dmp
-
Size
60KB
-
Sample
220623-glcccaefe3
-
MD5
7af7e472bf66269a0f12cf90b70b7e9f
-
SHA1
9bef5e4abc1c654c70c8656b21980a3e7971dae4
-
SHA256
0d5b7b110cd667413c0bb6bc12f299c19edc0965b018f591324482787b8a932b
-
SHA512
10aab3061c29cd45a4fa42d5d78bd7dad965cab3cf7dc5ffa14a5682e1031de3e71ab4a7084e26f98eea7765eebc23c561227ab39850454fefb46d3570214ac7
Behavioral task
behavioral1
Sample
3064-131-0x0000000000520000-0x000000000052F000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3064-131-0x0000000000520000-0x000000000052F000-memory.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
gozi_ifsb
20000
apghn.msn.com
188.126.76.221
-
base_path
/budweiser/
-
build
250235
-
exe_type
loader
-
extension
.bbu
-
server_id
50
Targets
-
-
Target
3064-131-0x0000000000520000-0x000000000052F000-memory.dmp
-
Size
60KB
-
MD5
7af7e472bf66269a0f12cf90b70b7e9f
-
SHA1
9bef5e4abc1c654c70c8656b21980a3e7971dae4
-
SHA256
0d5b7b110cd667413c0bb6bc12f299c19edc0965b018f591324482787b8a932b
-
SHA512
10aab3061c29cd45a4fa42d5d78bd7dad965cab3cf7dc5ffa14a5682e1031de3e71ab4a7084e26f98eea7765eebc23c561227ab39850454fefb46d3570214ac7
Score3/10 -