General
-
Target
b3881ec30ea55a181293f76e766b316160fcc531ccb5655bee11fe99528dcf5b
-
Size
956KB
-
Sample
230129-wc2yzahd2t
-
MD5
8dc441f4de71b743c8a8496e280880f2
-
SHA1
0bf69a14d7997ca813c32460e89cec31c1253fa9
-
SHA256
b3881ec30ea55a181293f76e766b316160fcc531ccb5655bee11fe99528dcf5b
-
SHA512
cb11307c7255cfd9cb1a73d4b75019d2a63c56d32843cffc57ca49522a98f447fb774f76669b4d3a4b382acea811fb2f7f009c0e02add51ac0535cf4f997c896
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qD:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPZ
Static task
static1
Behavioral task
behavioral1
Sample
b3881ec30ea55a181293f76e766b316160fcc531ccb5655bee11fe99528dcf5b.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
b3881ec30ea55a181293f76e766b316160fcc531ccb5655bee11fe99528dcf5b
-
Size
956KB
-
MD5
8dc441f4de71b743c8a8496e280880f2
-
SHA1
0bf69a14d7997ca813c32460e89cec31c1253fa9
-
SHA256
b3881ec30ea55a181293f76e766b316160fcc531ccb5655bee11fe99528dcf5b
-
SHA512
cb11307c7255cfd9cb1a73d4b75019d2a63c56d32843cffc57ca49522a98f447fb774f76669b4d3a4b382acea811fb2f7f009c0e02add51ac0535cf4f997c896
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qD:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPZ
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-