Analysis
-
max time kernel
44s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:58
Static task
static1
Behavioral task
behavioral1
Sample
ef8401bbced442697964c5f58d4312ce9c08881a2a3f5982a643f4856591f4d2.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ef8401bbced442697964c5f58d4312ce9c08881a2a3f5982a643f4856591f4d2.exe
-
Size
1.8MB
-
MD5
938b6b238e4db39d4849b32755dbffd0
-
SHA1
f51757be269296835eb54c93d110c1d1ef72863a
-
SHA256
ef8401bbced442697964c5f58d4312ce9c08881a2a3f5982a643f4856591f4d2
-
SHA512
cc9c99334aa522b9a6e87df163c20f81511b27ea84af1c719bb05a1c03d63e6bd0c81d50a7caeb5f33b0b4131b26aed750a177aaab997d3021a01e15ba78a6b3
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214098
Extracted
Family
gozi_ifsb
Botnet
3493
C2
google.com
gmail.com
lsammietf53.com
p28u70webster.com
ploi7260m71.com
Attributes
-
build
214098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1080-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmpFilesize
8KB
-
memory/1080-56-0x0000000000970000-0x000000000097E000-memory.dmpFilesize
56KB
-
memory/1080-55-0x0000000000970000-0x0000000000CCC000-memory.dmpFilesize
3.4MB
-
memory/1080-57-0x0000000000970000-0x0000000000CCC000-memory.dmpFilesize
3.4MB
-
memory/1080-58-0x0000000000970000-0x0000000000CCC000-memory.dmpFilesize
3.4MB
-
memory/1080-59-0x0000000000250000-0x000000000025F000-memory.dmpFilesize
60KB