Analysis
-
max time kernel
79s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 16:25
Static task
static1
Behavioral task
behavioral1
Sample
3b7338dc8d86bb58866fdbf4b31ffbe65403a1b28effa3ee60a4932a5a731437.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
3b7338dc8d86bb58866fdbf4b31ffbe65403a1b28effa3ee60a4932a5a731437.exe
-
Size
455KB
-
MD5
8b51822dddf3a353c97143432c6204ad
-
SHA1
e21184cdfa247aa7abb75db52f3fa3ccc09389a8
-
SHA256
3b7338dc8d86bb58866fdbf4b31ffbe65403a1b28effa3ee60a4932a5a731437
-
SHA512
e8fcff16945247334e011490fd10ef10b8fd41af26d8425d2f5805263a7eed7272c74b8544f37266d33cc2b27a830d3cb22f1e0aa10de1e488b0b709fd40901b
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214062
Extracted
Family
gozi_ifsb
Botnet
3183
C2
v99jarret3287x.com
huymireyai.company
so64a92elody.email
Attributes
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2492-130-0x00000000009F0000-0x0000000000A6B000-memory.dmpFilesize
492KB
-
memory/2492-132-0x00000000009F0000-0x0000000000A6B000-memory.dmpFilesize
492KB
-
memory/2492-131-0x00000000009F0000-0x00000000009FF000-memory.dmpFilesize
60KB
-
memory/2492-133-0x00000000009F0000-0x0000000000A6B000-memory.dmpFilesize
492KB
-
memory/2492-134-0x0000000002430000-0x000000000244B000-memory.dmpFilesize
108KB
-
memory/2492-137-0x00000000009F0000-0x0000000000A6B000-memory.dmpFilesize
492KB