General
-
Target
7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1
-
Size
298KB
-
Sample
220731-lvyzxsaee9
-
MD5
ac9c437a379f66b5a5a054f8fa2f879a
-
SHA1
53cfe57f0e419e62b78cf058f955903c7b34d45c
-
SHA256
7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1
-
SHA512
465af8ccba10b71c847291806015e12e30cbd96e528b615d89e8f9472e8d14320287c2a32eccb2f7abf3c06a31d0edc4eed1ad047834c43fb0b3b0bc3bcf1cdf
Static task
static1
Behavioral task
behavioral1
Sample
7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1.exe
Resource
win7-20220715-en
Malware Config
Extracted
gozi_ifsb
2000
has.votaritar.at/webstore
-
build
217099
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
dns_servers
8.8.8.8
195.10.195.195
8.8.4.4
95.216.174.175
193.30.123.44
94.247.43.254
-
exe_type
loader
-
server_id
550
Targets
-
-
Target
7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1
-
Size
298KB
-
MD5
ac9c437a379f66b5a5a054f8fa2f879a
-
SHA1
53cfe57f0e419e62b78cf058f955903c7b34d45c
-
SHA256
7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1
-
SHA512
465af8ccba10b71c847291806015e12e30cbd96e528b615d89e8f9472e8d14320287c2a32eccb2f7abf3c06a31d0edc4eed1ad047834c43fb0b3b0bc3bcf1cdf
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-