General
-
Target
6ff9b5c8ff0fc10f3bcce07c4f4fda2eaa351188
-
Size
160KB
-
Sample
220711-3x4fvseafr
-
MD5
24433fe5aed50417b17663e46bacf92c
-
SHA1
6ff9b5c8ff0fc10f3bcce07c4f4fda2eaa351188
-
SHA256
263be47f602b2156c9282afdd6a0f1fe9bb9022cef2eb0a821e8d8153d3a8d06
-
SHA512
c833a0e82e83e663eb362e7c18ae737d5750df2f1ad55ba68ba33ab87ed3d181b30bc8672f0a58e60ea25c0067b548e11d90cd8c8b4f566450fec01712900720
Static task
static1
Behavioral task
behavioral1
Sample
6ff9b5c8ff0fc10f3bcce07c4f4fda2eaa351188.dll
Resource
win7-20220414-en
Malware Config
Extracted
gozi_ifsb
2200
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
-
build
250180
-
exe_type
loader
-
server_id
730
Targets
-
-
Target
6ff9b5c8ff0fc10f3bcce07c4f4fda2eaa351188
-
Size
160KB
-
MD5
24433fe5aed50417b17663e46bacf92c
-
SHA1
6ff9b5c8ff0fc10f3bcce07c4f4fda2eaa351188
-
SHA256
263be47f602b2156c9282afdd6a0f1fe9bb9022cef2eb0a821e8d8153d3a8d06
-
SHA512
c833a0e82e83e663eb362e7c18ae737d5750df2f1ad55ba68ba33ab87ed3d181b30bc8672f0a58e60ea25c0067b548e11d90cd8c8b4f566450fec01712900720
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-