Analysis

  • max time kernel
    42s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    01-07-2022 07:56

General

  • Target

    3e471ade24273a6b6dff97917d85289f59f3ce48925a65ab367dfa0958327a39.exe

  • Size

    376KB

  • MD5

    f697ec6610a8962f5d8913ad6a46cca5

  • SHA1

    699bde620200d914c329a5786af1968e1e0dda2b

  • SHA256

    3e471ade24273a6b6dff97917d85289f59f3ce48925a65ab367dfa0958327a39

  • SHA512

    7f84d13f4d8317b4822027c2f97e7104ee7610a8b943b489b51ea7b83c3ffbe275b015227d8cbb81186aca90816fbe6fb0226ccf94049bd4b91f06f8513fe3b6

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3195

C2

nsyblefgg.city

m25lni11528.com

dgrover.band

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e471ade24273a6b6dff97917d85289f59f3ce48925a65ab367dfa0958327a39.exe
    "C:\Users\Admin\AppData\Local\Temp\3e471ade24273a6b6dff97917d85289f59f3ce48925a65ab367dfa0958327a39.exe"
    1⤵
      PID:1944

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1944-54-0x00000000753C1000-0x00000000753C3000-memory.dmp
      Filesize

      8KB

    • memory/1944-56-0x0000000001010000-0x000000000107F000-memory.dmp
      Filesize

      444KB

    • memory/1944-55-0x0000000001010000-0x000000000101F000-memory.dmp
      Filesize

      60KB

    • memory/1944-57-0x0000000000170000-0x000000000018B000-memory.dmp
      Filesize

      108KB