Malware Analysis Report

2024-09-09 17:10

Sample ID 220712-nh8dyaagf2
Target 4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71
SHA256 4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71
Tags
gozi_ifsb 3153 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71

Threat Level: Known bad

The file 4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71 was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb 3153 banker trojan

Gozi, Gozi IFSB

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-12 11:24

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-12 11:24

Reported

2022-07-12 16:47

Platform

win7-20220414-en

Max time kernel

143s

Max time network

47s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71.exe"

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Processes

C:\Users\Admin\AppData\Local\Temp\4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71.exe

"C:\Users\Admin\AppData\Local\Temp\4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71.exe"

Network

N/A

Files

memory/2020-54-0x0000000000400000-0x000000000040F000-memory.dmp

memory/2020-55-0x0000000000400000-0x0000000000441000-memory.dmp

memory/2020-56-0x0000000000450000-0x000000000046B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-07-12 11:24

Reported

2022-07-12 16:47

Platform

win10v2004-20220414-en

Max time kernel

34s

Max time network

39s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71.exe"

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Processes

C:\Users\Admin\AppData\Local\Temp\4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71.exe

"C:\Users\Admin\AppData\Local\Temp\4afa2d9390aced193d03ddcff96679df8aa761a9f9d56ce39ebfa28b34e1eb71.exe"

Network

Country Destination Domain Proto
US 52.109.8.21:443 tcp
US 20.189.173.10:443 tcp

Files

memory/1684-130-0x0000000000400000-0x000000000040F000-memory.dmp

memory/1684-131-0x0000000000400000-0x0000000000441000-memory.dmp

memory/1684-132-0x00000000020A0000-0x00000000020BB000-memory.dmp