Analysis
-
max time kernel
22s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 03:08
Static task
static1
Behavioral task
behavioral1
Sample
5065fc2a90b484bcbd178776debf25f4d82330148bff2a02b3e915e0ddf2ab16.exe
Resource
win7-20220715-en
1 signatures
150 seconds
General
-
Target
5065fc2a90b484bcbd178776debf25f4d82330148bff2a02b3e915e0ddf2ab16.exe
-
Size
203KB
-
MD5
963d739cf2e53487004a354a9550e871
-
SHA1
c1bda9bec47aa96866b1270f21e28d8bb211c58a
-
SHA256
5065fc2a90b484bcbd178776debf25f4d82330148bff2a02b3e915e0ddf2ab16
-
SHA512
2f57a1003b25c40664f21941fc022fcf46de4bb0a058b015818465f34f13648e58403a8d7219f286c2a8d11483e60706e85c4035aa5626d5cf75ec453282eb2e
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
215165
Extracted
Family
gozi_ifsb
Botnet
3162
C2
menehleibe.com
liemuteste.com
thulligend.com
Attributes
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1856-54-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1856-56-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1856-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1856-57-0x00000000005D0000-0x00000000005EB000-memory.dmpFilesize
108KB
-
memory/1856-60-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB