Analysis

  • max time kernel
    39s
  • max time network
    84s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-06-2022 23:08

General

  • Target

    35c4aa3784531cd17232121b69bf4650eb52f3477f83cb3661ce9dd430b08d58.exe

  • Size

    372KB

  • MD5

    1b2717ebfdec292219403e5db3c15423

  • SHA1

    fdfb4d7f8181feb950c06ba985a29b8da6d5b79e

  • SHA256

    35c4aa3784531cd17232121b69bf4650eb52f3477f83cb3661ce9dd430b08d58

  • SHA512

    81a8f426bc35434065249e76291bfb9b188b2b1f7f19e8d1e57488fe2c2cbeefa479debde61d161fc4c92bd344617ea8159c06e99f863bf367721c146242d7b0

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214062

Extracted

Family

gozi_ifsb

Botnet

3181

C2

bm25yp.com

xiivhaaou.email

m264591jasen.city

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\35c4aa3784531cd17232121b69bf4650eb52f3477f83cb3661ce9dd430b08d58.exe
    "C:\Users\Admin\AppData\Local\Temp\35c4aa3784531cd17232121b69bf4650eb52f3477f83cb3661ce9dd430b08d58.exe"
    1⤵
      PID:1392

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1392-130-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/1392-131-0x0000000000400000-0x000000000046D000-memory.dmp
      Filesize

      436KB

    • memory/1392-132-0x0000000000790000-0x00000000007AB000-memory.dmp
      Filesize

      108KB