General
-
Target
6c4463df22dba5d021888723eeb5a585c12a8c43ae5b352800dc4ee0f722b405
-
Size
168KB
-
Sample
221126-pgaa7afe2s
-
MD5
919506160ba6d0cf88cb7018c1755410
-
SHA1
49ff026440e403aac2abb6738b9fb42ad46ecdea
-
SHA256
6c4463df22dba5d021888723eeb5a585c12a8c43ae5b352800dc4ee0f722b405
-
SHA512
72fc023e22708506af2c455d30c252923798b42fe58e54f61dd118d0348fb953234ddd2b38d1a092d9410a35ae65bc3047fee749beab45c90639d25797fedc25
-
SSDEEP
3072:V2zxNCCVUopBzcb7UKtgb+thC+Y4dNdm6iBtBVcRRnQmywwE63CCZwFcTkmp:C3VUopBojeALY0zNiDcbQN137k
Behavioral task
behavioral1
Sample
6c4463df22dba5d021888723eeb5a585c12a8c43ae5b352800dc4ee0f722b405.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6c4463df22dba5d021888723eeb5a585c12a8c43ae5b352800dc4ee0f722b405.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1001
redwoodmotors.ru
pampers-globalworld.ru
pinkfloyd-mp3love.ru
sosandhelpconnect.ru
-
build
213425
-
exe_type
worker
Targets
-
-
Target
6c4463df22dba5d021888723eeb5a585c12a8c43ae5b352800dc4ee0f722b405
-
Size
168KB
-
MD5
919506160ba6d0cf88cb7018c1755410
-
SHA1
49ff026440e403aac2abb6738b9fb42ad46ecdea
-
SHA256
6c4463df22dba5d021888723eeb5a585c12a8c43ae5b352800dc4ee0f722b405
-
SHA512
72fc023e22708506af2c455d30c252923798b42fe58e54f61dd118d0348fb953234ddd2b38d1a092d9410a35ae65bc3047fee749beab45c90639d25797fedc25
-
SSDEEP
3072:V2zxNCCVUopBzcb7UKtgb+thC+Y4dNdm6iBtBVcRRnQmywwE63CCZwFcTkmp:C3VUopBojeALY0zNiDcbQN137k
Score10/10-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-