General
-
Target
511abcddfa725780593528ef56944433c92089e49bbf75b005fed739ae3b82be
-
Size
388KB
-
Sample
220718-wf8wpadber
-
MD5
3474be0fade46da14a1875ed0ab1367b
-
SHA1
771fec73856533568dc757c719389142109ce3c4
-
SHA256
511abcddfa725780593528ef56944433c92089e49bbf75b005fed739ae3b82be
-
SHA512
142e88d130552cf0ad4dfbaac394a56ecfc5bf2e07f4137db4323894310d4c215d70b1e9712d45b840e13e56d69c007e93b1018f24ba003794857123f95e3b94
Static task
static1
Behavioral task
behavioral1
Sample
511abcddfa725780593528ef56944433c92089e49bbf75b005fed739ae3b82be.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
511abcddfa725780593528ef56944433c92089e49bbf75b005fed739ae3b82be.exe
Resource
win10v2004-20220718-en
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
511abcddfa725780593528ef56944433c92089e49bbf75b005fed739ae3b82be
-
Size
388KB
-
MD5
3474be0fade46da14a1875ed0ab1367b
-
SHA1
771fec73856533568dc757c719389142109ce3c4
-
SHA256
511abcddfa725780593528ef56944433c92089e49bbf75b005fed739ae3b82be
-
SHA512
142e88d130552cf0ad4dfbaac394a56ecfc5bf2e07f4137db4323894310d4c215d70b1e9712d45b840e13e56d69c007e93b1018f24ba003794857123f95e3b94
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-