Malware Analysis Report

2024-07-28 14:24

Sample ID 220731-y9gemsgbfl
Target 5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52
SHA256 5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52
Tags
gozi_ifsb 3151 banker trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52

Threat Level: Known bad

The file 5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52 was found to be: Known bad.

Malicious Activity Summary

gozi_ifsb 3151 banker trojan

Gozi, Gozi IFSB

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2022-07-31 20:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-07-31 20:28

Reported

2022-07-31 22:29

Platform

win7-20220715-en

Max time kernel

116s

Max time network

49s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52.exe"

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Processes

C:\Users\Admin\AppData\Local\Temp\5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52.exe

"C:\Users\Admin\AppData\Local\Temp\5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52.exe"

Network

Country Destination Domain Proto
US 93.184.220.29:80 tcp
US 204.79.197.200:443 tcp

Files

memory/1752-54-0x0000000000E10000-0x0000000000E1F000-memory.dmp

memory/1752-55-0x0000000000E10000-0x0000000000E63000-memory.dmp

memory/1752-56-0x0000000000170000-0x000000000018B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-07-31 20:28

Reported

2022-07-31 22:29

Platform

win10v2004-20220721-en

Max time kernel

25s

Max time network

29s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52.exe"

Signatures

Gozi, Gozi IFSB

banker trojan gozi_ifsb

Processes

C:\Users\Admin\AppData\Local\Temp\5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52.exe

"C:\Users\Admin\AppData\Local\Temp\5e5f74f78f386854fccea77bc4d05e2e2944d12e8b9c49667860b6503564fd52.exe"

Network

Country Destination Domain Proto
IE 20.190.159.73:443 tcp

Files

memory/4176-130-0x0000000000770000-0x000000000077F000-memory.dmp

memory/4176-131-0x0000000000770000-0x00000000007C3000-memory.dmp

memory/4176-132-0x00000000009C0000-0x00000000009DB000-memory.dmp