General
-
Target
8c340810b289bb9addfc9edb7c6dcd47d9f990135bac7b43406a985383b71da1
-
Size
237KB
-
Sample
221012-25grdsgdbp
-
MD5
7828f04aee05ad7e4347a68c431b1fb1
-
SHA1
1ef468bd21702883264cf01fc7412ba681713ccc
-
SHA256
8c340810b289bb9addfc9edb7c6dcd47d9f990135bac7b43406a985383b71da1
-
SHA512
953d1d7cab60bf73b840a4c5c7b0f24ffc8f7a3cca62595ba933a9a4a590f7549a62fc839ebfdab2d152804b3f1eb876c47553e05451d71f5ac1d7bb9cdbef4c
-
SSDEEP
6144:1QmqVJbaflmsnFJlJfn5WsR4t5n3jJ9ZMjvA5wG:1GnKF1f5W24t5t9Z2vA
Static task
static1
Behavioral task
behavioral1
Sample
8c340810b289bb9addfc9edb7c6dcd47d9f990135bac7b43406a985383b71da1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8c340810b289bb9addfc9edb7c6dcd47d9f990135bac7b43406a985383b71da1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
gozi_ifsb
3
rootapi.su
root-api.su
rootapigoogle.su
rootapi-google.su
root-apigoogle.su
rootgoogle.su
root-google.su
rootgoogleapi.su
rootgoogle-api.su
root-googleapi.su
91.226.212.148
-
exe_type
worker
Targets
-
-
Target
8c340810b289bb9addfc9edb7c6dcd47d9f990135bac7b43406a985383b71da1
-
Size
237KB
-
MD5
7828f04aee05ad7e4347a68c431b1fb1
-
SHA1
1ef468bd21702883264cf01fc7412ba681713ccc
-
SHA256
8c340810b289bb9addfc9edb7c6dcd47d9f990135bac7b43406a985383b71da1
-
SHA512
953d1d7cab60bf73b840a4c5c7b0f24ffc8f7a3cca62595ba933a9a4a590f7549a62fc839ebfdab2d152804b3f1eb876c47553e05451d71f5ac1d7bb9cdbef4c
-
SSDEEP
6144:1QmqVJbaflmsnFJlJfn5WsR4t5n3jJ9ZMjvA5wG:1GnKF1f5W24t5t9Z2vA
Score10/10-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-