General
-
Target
e7f652d8c7a7008cd1a6e6d310b6a9ffc6f7b1aac8d919b791405d5d67c6d240
-
Size
301KB
-
Sample
221228-a9v12acb2v
-
MD5
f8697692651df4409cd41ac29ff9a6ee
-
SHA1
868509362dacfad2aba26e38896e4a939f22649c
-
SHA256
e7f652d8c7a7008cd1a6e6d310b6a9ffc6f7b1aac8d919b791405d5d67c6d240
-
SHA512
1c9503db68990280398b3186adc66998fcea246dc9f8818fa05738d7cb4685a36a0342ea4edd9fae56f93d7dc77307ec8781b6b09c90bad08ccbb8a2ad507cc8
-
SSDEEP
6144:8KALyWutF2wTROenFTJvW3WRm5s3/9UZdLaYon5Jk4eROwNj:+GWAFn9B1AeOdin5JFW
Static task
static1
Malware Config
Extracted
gozi
Extracted
gozi
22500
confisg.edge.skype.com
http://
s28bxcw.xyz
config.edgse.skype.com
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
loader
-
extension
.alo
-
server_id
50
Extracted
amadey
3.63
62.204.41.165/g8sjnd3xe/index.php
Extracted
gozi
22500
confisg.edge.skype.com
http://s28bxcw.xyz
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
worker
-
extension
.alo
-
server_id
50
Targets
-
-
Target
e7f652d8c7a7008cd1a6e6d310b6a9ffc6f7b1aac8d919b791405d5d67c6d240
-
Size
301KB
-
MD5
f8697692651df4409cd41ac29ff9a6ee
-
SHA1
868509362dacfad2aba26e38896e4a939f22649c
-
SHA256
e7f652d8c7a7008cd1a6e6d310b6a9ffc6f7b1aac8d919b791405d5d67c6d240
-
SHA512
1c9503db68990280398b3186adc66998fcea246dc9f8818fa05738d7cb4685a36a0342ea4edd9fae56f93d7dc77307ec8781b6b09c90bad08ccbb8a2ad507cc8
-
SSDEEP
6144:8KALyWutF2wTROenFTJvW3WRm5s3/9UZdLaYon5Jk4eROwNj:+GWAFn9B1AeOdin5JFW
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-