General
-
Target
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
-
Size
457KB
-
Sample
220724-y5l5bsfdbj
-
MD5
13b78d808996120ae0ce4d1b19947c3e
-
SHA1
6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed
-
SHA256
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
-
SHA512
1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd
Static task
static1
Behavioral task
behavioral1
Sample
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
gozi_ifsb
-
build
214963
Targets
-
-
Target
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
-
Size
457KB
-
MD5
13b78d808996120ae0ce4d1b19947c3e
-
SHA1
6937e2e6301f5ecb0251c26a3ad0afe4a0d30aed
-
SHA256
57b374e2d2f002c11c69b454fcf1aa57bd971cd0638eca12c6691cdb6a2f011c
-
SHA512
1c8000f502c10222aa4e14ae00a709d0f0684286de3a125b41649d8749632a91fba31866ce949713cc7920651745ab1f1f9fe3568d25c9065e37de2c47f754dd
Score10/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-