General
-
Target
4e4b34bdcbdb30a84551eab03fcf1233a592d4c7090b32fb4a9199b02dd72406
-
Size
351KB
-
Sample
220720-wpap9aead3
-
MD5
640a6ec2eb0dd677c61aa38cd2b447e8
-
SHA1
cad702cddcf7a4b88b53708a97c12b6a5f13ac72
-
SHA256
4e4b34bdcbdb30a84551eab03fcf1233a592d4c7090b32fb4a9199b02dd72406
-
SHA512
4e73a875877def4b1feadcbdef622b1a6cc214bdfa608edc6c354bdf038a8e85ffe5eb9c2d5d2d900acd33d6c31fe1d27b6d1846287c2829500ee93c51cbab36
Static task
static1
Behavioral task
behavioral1
Sample
4e4b34bdcbdb30a84551eab03fcf1233a592d4c7090b32fb4a9199b02dd72406.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
4e4b34bdcbdb30a84551eab03fcf1233a592d4c7090b32fb4a9199b02dd72406.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
gozi_ifsb
1010
diuolirt.at
deopliazae.at
nifredao.com
filokiyurt.at
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
4e4b34bdcbdb30a84551eab03fcf1233a592d4c7090b32fb4a9199b02dd72406
-
Size
351KB
-
MD5
640a6ec2eb0dd677c61aa38cd2b447e8
-
SHA1
cad702cddcf7a4b88b53708a97c12b6a5f13ac72
-
SHA256
4e4b34bdcbdb30a84551eab03fcf1233a592d4c7090b32fb4a9199b02dd72406
-
SHA512
4e73a875877def4b1feadcbdef622b1a6cc214bdfa608edc6c354bdf038a8e85ffe5eb9c2d5d2d900acd33d6c31fe1d27b6d1846287c2829500ee93c51cbab36
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-