General
-
Target
Gennaio_url
-
Size
198B
-
Sample
230112-nqnz9sfg86
-
MD5
c359626e0daea8955bdbb417316c38ba
-
SHA1
0de679c73d0d580050e252d4aa1924920ff77d3b
-
SHA256
00a11f7f6f468459711a2907e4dc74f7d574b37c7bc5f2b8e73e518848ff9d50
-
SHA512
2ead9ffcb4eb3b878c497c370071cf283e17bb006728219507b250a60e0d6dcd629b30365074d649773086245a8086091e0cd60a60effcd97d88315e3ca66174
Static task
static1
Behavioral task
behavioral1
Sample
Gennaio_url.url
Resource
win7-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
7704
checklist.skype.com
62.173.149.202
31.41.44.158
193.0.178.157
-
base_path
/drew/
-
build
250249
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
Gennaio_url
-
Size
198B
-
MD5
c359626e0daea8955bdbb417316c38ba
-
SHA1
0de679c73d0d580050e252d4aa1924920ff77d3b
-
SHA256
00a11f7f6f468459711a2907e4dc74f7d574b37c7bc5f2b8e73e518848ff9d50
-
SHA512
2ead9ffcb4eb3b878c497c370071cf283e17bb006728219507b250a60e0d6dcd629b30365074d649773086245a8086091e0cd60a60effcd97d88315e3ca66174
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-