General
-
Target
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
Size
301KB
-
Sample
221229-e38qrscc96
-
MD5
2696436262a5e030ee3ea3957fed4c9a
-
SHA1
7dc56a360e948a0f9818abc5dbe1264e3595c054
-
SHA256
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
SHA512
180f8cdd55fd7454a40053f4e1ad962fb6b1374a24a10ccd00027cbd6e480259084131c11ca8d259ed3557ad9ecd9b09d1076ba437a1c685845e8b59d7735531
-
SSDEEP
6144:NTLZ0WbjOnFu5ROu41+xgp/9UZdLaYon5Jk4eROw:Jl0BuvOzUdin5JF
Static task
static1
Behavioral task
behavioral1
Sample
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
22500
confisg.edge.skype.com
http://
s28bxcw.xyz
config.edgse.skype.com
http://89.43.107.7
-
base_path
/recycle/
-
build
250249
-
exe_type
loader
-
extension
.alo
-
server_id
50
Extracted
gozi
22500
confisg.edge.skype.com
http://5icvzwz.xyz
http://185.14.45.80
-
base_path
/recycle/
-
build
250249
-
exe_type
worker
-
extension
.alo
-
server_id
50
Targets
-
-
Target
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
Size
301KB
-
MD5
2696436262a5e030ee3ea3957fed4c9a
-
SHA1
7dc56a360e948a0f9818abc5dbe1264e3595c054
-
SHA256
9d7301c67f1622ae78ecb47d85bf5e693bc92f2a4c963068c03b6f7b24f33b96
-
SHA512
180f8cdd55fd7454a40053f4e1ad962fb6b1374a24a10ccd00027cbd6e480259084131c11ca8d259ed3557ad9ecd9b09d1076ba437a1c685845e8b59d7735531
-
SSDEEP
6144:NTLZ0WbjOnFu5ROu41+xgp/9UZdLaYon5Jk4eROw:Jl0BuvOzUdin5JF
-
Detects Smokeloader packer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-