Analysis

  • max time kernel
    52s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    08-07-2022 08:46

General

  • Target

    40dfa4d40e3184ab702494d844a9cdfbdad01d5ddcd0046cfc596c979cd8a24a.exe

  • Size

    372KB

  • MD5

    0dd4ab940571a71b1bb57ead1ec8b3a1

  • SHA1

    cb4a538e0877862a41341c61e14bef58f4cef4d5

  • SHA256

    40dfa4d40e3184ab702494d844a9cdfbdad01d5ddcd0046cfc596c979cd8a24a

  • SHA512

    d3a53b10190bd94b2c5b01019ddfe1021bc8fb448fd2502ecc91cbdb2916cff212e985e7b24d4a3fc489305586a8a8e4d10c3e640b52de1180862771c477499f

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214062

Extracted

Family

gozi_ifsb

Botnet

3181

C2

bm25yp.com

xiivhaaou.email

m264591jasen.city

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\40dfa4d40e3184ab702494d844a9cdfbdad01d5ddcd0046cfc596c979cd8a24a.exe
    "C:\Users\Admin\AppData\Local\Temp\40dfa4d40e3184ab702494d844a9cdfbdad01d5ddcd0046cfc596c979cd8a24a.exe"
    1⤵
      PID:1296

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1296-54-0x0000000074F21000-0x0000000074F23000-memory.dmp
      Filesize

      8KB

    • memory/1296-55-0x0000000000400000-0x000000000040F000-memory.dmp
      Filesize

      60KB

    • memory/1296-56-0x0000000000400000-0x000000000046D000-memory.dmp
      Filesize

      436KB

    • memory/1296-57-0x0000000000310000-0x000000000032B000-memory.dmp
      Filesize

      108KB