Analysis

  • max time kernel
    22s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    07-07-2022 19:22

General

  • Target

    44687cfc131731793b73a38524d6e4f9a874b38770272e66258bd081fcbc65fe.exe

  • Size

    203KB

  • MD5

    cb00a529ea89e990cf3120c55ea0131e

  • SHA1

    86539334bc0b11826dc8af507267e98d7e5cae0d

  • SHA256

    44687cfc131731793b73a38524d6e4f9a874b38770272e66258bd081fcbc65fe

  • SHA512

    d97ad44ff3786b04132526e52c0749f383a9d059ab233a28244555d9264b4843861256e4449d8b08b28848b0092ed35afc4a5d3870fafcf93fe1722a6c40b7f7

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    215165

Extracted

Family

gozi_ifsb

Botnet

3162

C2

menehleibe.com

liemuteste.com

thulligend.com

Attributes
  • build

    215165

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\44687cfc131731793b73a38524d6e4f9a874b38770272e66258bd081fcbc65fe.exe
    "C:\Users\Admin\AppData\Local\Temp\44687cfc131731793b73a38524d6e4f9a874b38770272e66258bd081fcbc65fe.exe"
    1⤵
      PID:860

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/860-54-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/860-56-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB

    • memory/860-55-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/860-57-0x0000000000270000-0x000000000028B000-memory.dmp
      Filesize

      108KB

    • memory/860-60-0x0000000000400000-0x000000000043F000-memory.dmp
      Filesize

      252KB