Analysis
-
max time kernel
75s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 03:48
Static task
static1
Behavioral task
behavioral1
Sample
3d3b98949928da15f0e9d33c15f3d269a33fd1436de78f46d5e4d6ee228188e1.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3d3b98949928da15f0e9d33c15f3d269a33fd1436de78f46d5e4d6ee228188e1.exe
-
Size
372KB
-
MD5
142ef9abb0d3fdc6f3650410f678f1e4
-
SHA1
ba381dc810d61e445064ea13bc17a1d95423ffce
-
SHA256
3d3b98949928da15f0e9d33c15f3d269a33fd1436de78f46d5e4d6ee228188e1
-
SHA512
892426bfc8037862decaf14e658fbbf1b9ab5f32848f723aca1d26eb24d84db036e1b495db2840627a8ecd190c7dfda616dc22869835206e98c3163a6bc6fd46
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214062
Extracted
Family
gozi_ifsb
Botnet
3181
C2
bm25yp.com
xiivhaaou.email
m264591jasen.city
Attributes
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1984-54-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/1984-56-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1984-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1984-57-0x0000000000290000-0x00000000002AB000-memory.dmpFilesize
108KB