Analysis
-
max time kernel
23s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
756549f6b141c02dcbe22e70617d975b5bdea5bd1578be8fe48896ffe76fc618.exe
Resource
win7-20220715-en
windows7-x64
1 signatures
150 seconds
General
-
Target
756549f6b141c02dcbe22e70617d975b5bdea5bd1578be8fe48896ffe76fc618.exe
-
Size
203KB
-
MD5
ff611a01cacfb099e141628a1c54438e
-
SHA1
81fc0144988c74839047e2799c8d5494372ceb92
-
SHA256
756549f6b141c02dcbe22e70617d975b5bdea5bd1578be8fe48896ffe76fc618
-
SHA512
016bfafd3630723ec53007be121e5d3d90aaa7b5b4262fc88b8536da3119b234566bbe1c9035a0aa318391e5ec23879aaa52d86c56f51cac672bd58ad85e3849
Malware Config
Extracted
Family
gozi_ifsb
Attributes
-
build
215165
Extracted
Family
gozi_ifsb
Botnet
3162
C2
menehleibe.com
liemuteste.com
thulligend.com
Attributes
-
build
215165
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
rsa_pubkey.plain
serpent.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1856-54-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1856-55-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1856-56-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1856-57-0x0000000000400000-0x000000000043F000-memory.dmpFilesize
252KB
-
memory/1856-58-0x00000000005D0000-0x00000000005EB000-memory.dmpFilesize
108KB