General
-
Target
94851348dd1d03a488811c1e56a2d15e491dcc1d0d250cfdf62bd3000db5c312
-
Size
956KB
-
Sample
230129-wc44bshd2v
-
MD5
63c56fd873aa75ea5446960179fec49e
-
SHA1
5ab751d9631eeb7a44351bd271b2ed4638362d85
-
SHA256
94851348dd1d03a488811c1e56a2d15e491dcc1d0d250cfdf62bd3000db5c312
-
SHA512
3f21c973cca02a3a0a7a026df612bef5e50b34ae34a7736d314f2203056489b3b41deb558c7fa50a9ac0d171dbde7c818a7805f5898bf29381accd14030419a3
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qS:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaP
Static task
static1
Behavioral task
behavioral1
Sample
94851348dd1d03a488811c1e56a2d15e491dcc1d0d250cfdf62bd3000db5c312.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
94851348dd1d03a488811c1e56a2d15e491dcc1d0d250cfdf62bd3000db5c312
-
Size
956KB
-
MD5
63c56fd873aa75ea5446960179fec49e
-
SHA1
5ab751d9631eeb7a44351bd271b2ed4638362d85
-
SHA256
94851348dd1d03a488811c1e56a2d15e491dcc1d0d250cfdf62bd3000db5c312
-
SHA512
3f21c973cca02a3a0a7a026df612bef5e50b34ae34a7736d314f2203056489b3b41deb558c7fa50a9ac0d171dbde7c818a7805f5898bf29381accd14030419a3
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qS:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaP
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-