Behavioral task
behavioral1
Sample
gozi.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
gozi.dll
Resource
win10v2004-20220812-en
General
-
Target
gozi.payload-disk
-
Size
43KB
-
MD5
2a29f12a43156619c6a97cb54844b053
-
SHA1
d7deab6e3c5e158b73c9ffb1455cb57f04423786
-
SHA256
5ea2b9d4c4b4f5f102d63de28ad8ce4016a01469cd2c2ab92be57e5af6839f87
-
SHA512
6face3d956fc26757a215d3b88c3acbd6bd9f2bf3899073bd86c0fb1c9aeb564e75f41503527afdccf7f2fff53247383a79730aca3e7388923ecf6c04660ebb3
-
SSDEEP
768:9TmE+L5AkTXKMaqD4leJiArJBFkK527nhoZ3eGiTb7gp6XFlkq9k:9TmE+L5AkTixchBOKinCZ3eGGb7dTR9k
Malware Config
Extracted
gozi_ifsb
40000
trackingg-protectioon.cdn1.mozilla.net
45.8.158.104
188.127.224.114
weiqeqwns.com
wdeiqeqwns.com
weiqeqwens.com
weiqewqwns.com
iujdhsndjfks.com
-
base_path
/uploaded/
-
build
250246
-
exe_type
loader
-
extension
.pct
-
server_id
50
Signatures
-
Gozi_ifsb family
Files
-
gozi.payload-disk.dll windows x86
ef075d26b728b78a932306e24062e80c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
ZwQueryInformationToken
ZwOpenProcess
ZwClose
ZwOpenProcessToken
_snwprintf
memcpy
strcpy
sprintf
mbstowcs
_snprintf
wcstombs
memset
_aulldiv
_allmul
_aullrem
RtlUnwind
NtQueryVirtualMemory
kernel32
RaiseException
LocalAlloc
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
SetEvent
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapDestroy
HeapCreate
SwitchToThread
lstrlenA
SetWaitableTimer
Process32First
WaitForSingleObject
SleepEx
CreateEventA
lstrlenW
GetLastError
GetProcAddress
Process32Next
WaitForMultipleObjects
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
CreateWaitableTimerA
lstrcpyA
ResetEvent
lstrcmpW
GetVersionExA
LoadLibraryA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
InterlockedExchange
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
QueryPerformanceFrequency
OpenProcess
GetVersion
GetCurrentProcessId
lstrcatA
QueryPerformanceCounter
GetComputerNameW
WideCharToMultiByte
GetComputerNameExA
oleaut32
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SysFreeString
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ