Analysis

  • max time kernel
    24s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-06-2022 18:56

General

  • Target

    3fceca0563b858ada30756b1440a3eedfe9a049709697e26de5f90dc3ee0c15d.exe

  • Size

    203KB

  • MD5

    a3f74aa01c42eacd53a50113b7bf25e4

  • SHA1

    d98b7d7b74985705130096252583e08611552399

  • SHA256

    3fceca0563b858ada30756b1440a3eedfe9a049709697e26de5f90dc3ee0c15d

  • SHA512

    a6412128808e85390df813c53a781e543f6ced154939d9519a597448ac3ea6f15c728232b68b56f7faee5599df46127f36b2848f8ea4e963314ee37382c2627b

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    215165

Extracted

Family

gozi_ifsb

Botnet

3162

C2

menehleibe.com

liemuteste.com

thulligend.com

Attributes
  • build

    215165

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fceca0563b858ada30756b1440a3eedfe9a049709697e26de5f90dc3ee0c15d.exe
    "C:\Users\Admin\AppData\Local\Temp\3fceca0563b858ada30756b1440a3eedfe9a049709697e26de5f90dc3ee0c15d.exe"
    1⤵
      PID:780

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/780-54-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/780-56-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/780-55-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/780-57-0x0000000000280000-0x000000000029B000-memory.dmp
      Filesize

      108KB

    • memory/780-60-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB