Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 15:19
Static task
static1
Behavioral task
behavioral1
Sample
4f2749d187c0b2b8242ce338dcf26afe070210ec71acadd42e65fec64e0d0619.exe
Resource
win7-20220718-en
windows7-x64
1 signatures
150 seconds
General
-
Target
4f2749d187c0b2b8242ce338dcf26afe070210ec71acadd42e65fec64e0d0619.exe
-
Size
372KB
-
MD5
247ded62c1a5fea25cff14468bb4db85
-
SHA1
455a236dc683c163c5267c21660870f180ca944c
-
SHA256
4f2749d187c0b2b8242ce338dcf26afe070210ec71acadd42e65fec64e0d0619
-
SHA512
a640dd1b522ce91ecac98382bfaa1966bb8b01290dd3ced12619176ec828d77738a0b09e2fc455d636b4a76a99baff5e16507df4e3695b9cd176ee812579a75d
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
214062
Extracted
Family
gozi_ifsb
Botnet
3181
C2
bm25yp.com
xiivhaaou.email
m264591jasen.city
Attributes
-
build
214062
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1740-54-0x00000000750B1000-0x00000000750B3000-memory.dmpFilesize
8KB
-
memory/1740-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1740-56-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1740-57-0x00000000002A0000-0x00000000002BB000-memory.dmpFilesize
108KB