Behavioral task
behavioral1
Sample
42923683022f255205e9e0269abf1d6d676b4b4dfa4afec040fb4b21c24e0676_unpacked.dll
Resource
win7-20220901-en
General
-
Target
42923683022f255205e9e0269abf1d6d676b4b4dfa4afec040fb4b21c24e0676_unpacked
-
Size
170KB
-
MD5
263bf11e355fd2179b1b956f9cb1979a
-
SHA1
394f360469c0186bc52dc4ff7074ca0bd9e25182
-
SHA256
15ff07302e7c183feb467ec8d12a9a701fcce95a78cf185f547ab82540f5d8e6
-
SHA512
f26cc52c695b1170d9e69ab0012ebb3994ec35b748bbc96d6d1212b1ae7b215e05f2025097d2e3d8795e159cb0a93d75b7941260a355b65c6083d20267095d7e
-
SSDEEP
3072:UnPGdDrlrx85OR2qcqnG923Ek/lBzLWE2pqlalXni0X3LDNqdcR0/KTD:Unc1dvFnGe/lBzyqlalS0XFq7K
Malware Config
Extracted
gozi_ifsb
1001
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
exe_type
worker
-
server_id
93
Signatures
-
Gozi_ifsb family
Files
-
42923683022f255205e9e0269abf1d6d676b4b4dfa4afec040fb4b21c24e0676_unpacked.dll windows x86
9aa02d8ae209bb9473ca87ae8ab1b2a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
sprintf
_snprintf
ZwQueryInformationToken
ZwOpenProcessToken
ZwOpenProcess
strcpy
NtQuerySystemInformation
ZwQueryInformationProcess
NtMapViewOfSection
NtUnmapViewOfSection
ZwClose
RtlNtStatusToDosError
NtCreateSection
RtlImageNtHeader
_strupr
_wcsupr
wcscpy
memset
RtlFreeUnicodeString
RtlUpcaseUnicodeString
ZwQueryKey
wcstombs
mbstowcs
memcpy
RtlAdjustPrivilege
_aulldiv
_allmul
_alldiv
_chkstk
RtlUnwind
NtQueryVirtualMemory
kernel32
CreateProcessA
GetComputerNameW
SetFilePointerEx
QueueUserWorkItem
FileTimeToLocalFileTime
SystemTimeToFileTime
GetModuleFileNameW
FileTimeToSystemTime
GetModuleFileNameA
HeapAlloc
GetLastError
RemoveDirectoryA
HeapFree
DeleteFileA
lstrcpyA
LoadLibraryA
CreateFileA
lstrcatA
lstrlenA
WriteFile
CreateDirectoryA
CloseHandle
InterlockedIncrement
InterlockedDecrement
HeapDestroy
HeapCreate
SetEvent
HeapReAlloc
GetTickCount
lstrcatW
CreateDirectoryW
OpenProcess
GetCurrentThreadId
DuplicateHandle
CreateFileW
Sleep
lstrlenW
DeleteFileW
CopyFileW
GetTempPathA
GetCurrentThread
CreateEventA
InterlockedExchange
SuspendThread
SetWaitableTimer
ResumeThread
GetSystemTimeAsFileTime
lstrcpyW
GetWindowsDirectoryA
GetModuleHandleA
CreateThread
SwitchToThread
SetLastError
lstrcmpiA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
CreateMutexA
lstrcmpA
OpenWaitableTimerA
OpenMutexA
ReleaseMutex
CreateWaitableTimerA
MapViewOfFile
UnmapViewOfFile
GetSystemTime
WaitForMultipleObjects
InitializeCriticalSection
RegisterWaitForSingleObject
TlsGetValue
TlsSetValue
LoadLibraryExW
VirtualAlloc
VirtualProtect
UnregisterWait
TlsAlloc
GetProcAddress
WideCharToMultiByte
OpenFileMappingA
LocalFree
GetLogicalDriveStringsW
GetExitCodeProcess
CreateFileMappingA
GetLocalTime
GetFileSize
GetDriveTypeW
lstrcpynA
OpenThread
Thread32Next
CreateToolhelp32Snapshot
QueueUserAPC
Thread32First
DisconnectNamedPipe
FlushFileBuffers
CreateNamedPipeA
CallNamedPipeA
WaitNamedPipeA
ReadFile
CancelIo
ConnectNamedPipe
GetOverlappedResult
AddVectoredExceptionHandler
OpenEventA
SleepEx
RemoveVectoredExceptionHandler
LocalAlloc
FreeLibrary
RaiseException
VirtualFree
GetCurrentProcessId
GetVersion
DeleteCriticalSection
FindClose
GetTempFileNameA
SetEndOfFile
ExpandEnvironmentStringsW
SetFilePointer
FindFirstFileW
GetFileAttributesW
FindNextFileW
RemoveDirectoryW
VirtualProtectEx
ResetEvent
Sections
.text Size: 133KB - Virtual size: 133KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ