General
-
Target
Installer4.8.msi
-
Size
108.2MB
-
Sample
220927-we39taeah7
-
MD5
d9398da0a685c457f2d103fd3ac8163a
-
SHA1
559ab94994830e1fe84c084fa26dfbd1104f15be
-
SHA256
97182caf61b84247b0ac06b824dd8de0cf06bb1a78486cc970b300f3e6edc20f
-
SHA512
b628b60e28ead8b6a1f29c50b87fca49aeb7497449795e5342a1f748d5e24d089d713380d651dc568f08ef51afe150d8f393086d1f11aa20f258b239f117a334
-
SSDEEP
3145728:4FEp1cAjJNOCsXvY27nm0LT419R/pt8OBp4e0/QNou:l7FfknLdTC9R/piq0
Static task
static1
Behavioral task
behavioral1
Sample
Installer4.8.msi
Resource
win7-20220901-en
Malware Config
Extracted
gozi_ifsb
10101
trackingg-protectioon.cdn1.mozilla.net
45.8.158.104
188.127.224.114
weiqeqwns.com
wdeiqeqwns.com
weiqeqwens.com
weiqewqwns.com
iujdhsndjfks.com
-
base_path
/uploaded/
-
build
250246
-
exe_type
loader
-
extension
.pct
-
server_id
50
Targets
-
-
Target
Installer4.8.msi
-
Size
108.2MB
-
MD5
d9398da0a685c457f2d103fd3ac8163a
-
SHA1
559ab94994830e1fe84c084fa26dfbd1104f15be
-
SHA256
97182caf61b84247b0ac06b824dd8de0cf06bb1a78486cc970b300f3e6edc20f
-
SHA512
b628b60e28ead8b6a1f29c50b87fca49aeb7497449795e5342a1f748d5e24d089d713380d651dc568f08ef51afe150d8f393086d1f11aa20f258b239f117a334
-
SSDEEP
3145728:4FEp1cAjJNOCsXvY27nm0LT419R/pt8OBp4e0/QNou:l7FfknLdTC9R/piq0
-
Nirsoft
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Registers COM server for autorun
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-