Behavioral task
behavioral1
Sample
42923683022f255205e9e0269abf1d6d676b4b4dfa4afec040fb4b21c24e0676_unpacked_x64.dll
Resource
win7-20220812-en
General
-
Target
42923683022f255205e9e0269abf1d6d676b4b4dfa4afec040fb4b21c24e0676_unpacked_x64
-
Size
213KB
-
MD5
513789aa7df7e5e4946db3abebae67d9
-
SHA1
e3c5dafdd760ce784db60f4246f6fa03f6d658d2
-
SHA256
2d9b9de594b0e492d22258446ddf99e3962cfd5024345702aa3070a5d77e4c60
-
SHA512
f471bbe3e0d7a33f28e868c563ccb526713a514c7b8afbc38817c8a7b5bda16cb7ea2303cbbf5eb72902c64ff3344eae632bc098185c99877102909f24866e95
-
SSDEEP
3072:HUaaULsZBelnhgJjGCL0pYQjI383dyUtq2sbtlroFeq+io3iIDPCiZpFip:HNaULUBelhgQCL0aVedyn5po8q+iSCp
Malware Config
Extracted
gozi_ifsb
1001
-
build
215840
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
exe_type
worker
-
server_id
93
Signatures
-
Gozi_ifsb family
Files
-
42923683022f255205e9e0269abf1d6d676b4b4dfa4afec040fb4b21c24e0676_unpacked_x64.dll windows x64
e75003ca3315f20cb9f243b8f927e406
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntdll
_snprintf
strcpy
ZwQueryInformationToken
ZwOpenProcess
ZwOpenProcessToken
NtQuerySystemInformation
ZwQueryInformationProcess
NtMapViewOfSection
NtUnmapViewOfSection
ZwClose
RtlNtStatusToDosError
NtCreateSection
memcpy
_strupr
_wcsupr
memset
wcscpy
RtlFreeUnicodeString
RtlUpcaseUnicodeString
ZwQueryKey
wcstombs
RtlImageNtHeader
mbstowcs
RtlAdjustPrivilege
sprintf
__C_specific_handler
__chkstk
kernel32
CreateFileMappingA
GetComputerNameW
SetFilePointerEx
QueueUserWorkItem
FileTimeToLocalFileTime
SystemTimeToFileTime
VirtualFree
GetModuleFileNameW
FileTimeToSystemTime
GetLocalTime
VirtualAlloc
HeapAlloc
CreateDirectoryA
GetLastError
HeapFree
RemoveDirectoryA
CloseHandle
LoadLibraryA
CreateFileA
DeleteFileA
lstrcpyA
lstrlenA
lstrcatA
WriteFile
HeapReAlloc
GetTickCount
HeapDestroy
HeapCreate
SetEvent
CreateFileW
GetCurrentThreadId
DuplicateHandle
Sleep
CopyFileW
lstrlenW
GetCurrentThread
SetWaitableTimer
GetSystemTimeAsFileTime
DeleteFileW
CreateEventA
GetWindowsDirectoryA
GetTempPathA
SuspendThread
ResumeThread
lstrcpyW
GetModuleHandleA
CreateDirectoryW
CreateThread
OpenProcess
SwitchToThread
lstrcatW
GetSystemTime
SetLastError
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
lstrcmpA
CreateMutexA
OpenWaitableTimerA
MapViewOfFile
OpenMutexA
UnmapViewOfFile
ReleaseMutex
CreateWaitableTimerA
InitializeCriticalSection
TlsAlloc
RegisterWaitForSingleObject
TlsGetValue
LoadLibraryExW
TlsSetValue
UnregisterWait
GetProcAddress
GetDriveTypeW
WideCharToMultiByte
GetLogicalDriveStringsW
OpenFileMappingA
GetExitCodeProcess
LocalFree
CreateProcessA
GetFileSize
lstrcpynA
OpenThread
Thread32Next
Thread32First
CreateToolhelp32Snapshot
QueueUserAPC
CancelIo
DisconnectNamedPipe
FlushFileBuffers
CallNamedPipeA
CreateNamedPipeA
WaitNamedPipeA
ReadFile
ConnectNamedPipe
GetOverlappedResult
AddVectoredExceptionHandler
SleepEx
OpenEventA
RemoveVectoredExceptionHandler
LocalAlloc
FreeLibrary
RaiseException
GetModuleFileNameA
GetCurrentProcessId
GetVersion
DeleteCriticalSection
VirtualProtect
FindNextFileW
SetEndOfFile
SetFilePointer
RemoveDirectoryW
FindFirstFileW
GetFileAttributesW
ExpandEnvironmentStringsW
FindClose
GetTempFileNameA
VirtualProtectEx
ResetEvent
Sections
.text Size: 169KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ