Analysis

  • max time kernel
    39s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-07-2022 15:47

General

  • Target

    49bb018a302ee1a392a5067f2d5630c94108ddd515cdad50cd0f932975444a30.exe

  • Size

    376KB

  • MD5

    9148c1ecd1cb5f0dd5c367df786dcb48

  • SHA1

    04d056f085879049964b5edf4165a989315b1b08

  • SHA256

    49bb018a302ee1a392a5067f2d5630c94108ddd515cdad50cd0f932975444a30

  • SHA512

    37486da752b7a7d883adb67aa5149d079edf96a29cf1198c2eb470976c5f8f2f8462d58cdc3ff9297eabbf7e208660b89ce1ec9474189cbe2b60954876bee994

Malware Config

Extracted

Family

gozi_ifsb

Attributes
  • build

    214062

Extracted

Family

gozi_ifsb

Botnet

3193

C2

fy76qn.email

dst1894.com

w40shailie.city

Attributes
  • build

    214062

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\49bb018a302ee1a392a5067f2d5630c94108ddd515cdad50cd0f932975444a30.exe
    "C:\Users\Admin\AppData\Local\Temp\49bb018a302ee1a392a5067f2d5630c94108ddd515cdad50cd0f932975444a30.exe"
    1⤵
      PID:920

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/920-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
      Filesize

      8KB

    • memory/920-56-0x0000000001180000-0x00000000011E7000-memory.dmp
      Filesize

      412KB

    • memory/920-55-0x0000000001180000-0x000000000118F000-memory.dmp
      Filesize

      60KB

    • memory/920-57-0x0000000000270000-0x000000000028B000-memory.dmp
      Filesize

      108KB