General
-
Target
d16704455547e98721bdc8ebc9a233376b24f086469b707fccf10da54eb77744
-
Size
229KB
-
Sample
221228-pakhksad46
-
MD5
96aa7e5cd62710829a1f3b17922fc117
-
SHA1
edd95f2c58e1c5dde12aff974e6d42ea7469695b
-
SHA256
d16704455547e98721bdc8ebc9a233376b24f086469b707fccf10da54eb77744
-
SHA512
e0d619d48fde2af62fef20ec4ff65e0d24852150ca560d6461a851843f775f516fa8cb63d32ec6ef2556aa8d53a3c78c4da529a91b67a9ce59169c377c162f74
-
SSDEEP
3072:kXRcBLv/M7j5vuvW1YPG8vqGqSMiustPtYKs/xAI99:G6LvE7N1WlcLQ1YDZ
Static task
static1
Malware Config
Extracted
gozi
Extracted
gozi
22500
confisg.edge.skype.com
http://
s28bxcw.xyz
config.edgse.skype.com
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
loader
-
extension
.alo
-
server_id
50
Extracted
amadey
3.63
62.204.41.165/g8sjnd3xe/index.php
Extracted
gozi
22500
confisg.edge.skype.com
http://5icvzwz.xyz
http://185.14.45.80
-
base_path
/recycle/
-
build
250249
-
exe_type
worker
-
extension
.alo
-
server_id
50
Targets
-
-
Target
d16704455547e98721bdc8ebc9a233376b24f086469b707fccf10da54eb77744
-
Size
229KB
-
MD5
96aa7e5cd62710829a1f3b17922fc117
-
SHA1
edd95f2c58e1c5dde12aff974e6d42ea7469695b
-
SHA256
d16704455547e98721bdc8ebc9a233376b24f086469b707fccf10da54eb77744
-
SHA512
e0d619d48fde2af62fef20ec4ff65e0d24852150ca560d6461a851843f775f516fa8cb63d32ec6ef2556aa8d53a3c78c4da529a91b67a9ce59169c377c162f74
-
SSDEEP
3072:kXRcBLv/M7j5vuvW1YPG8vqGqSMiustPtYKs/xAI99:G6LvE7N1WlcLQ1YDZ
-
Detect Amadey credential stealer module
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-