General
-
Target
8297282352f3f5faa925a8d7913c3750dcebb5dc6668b5b5e6e3331081717baa
-
Size
956KB
-
Sample
230129-wc7jfsfh82
-
MD5
9881f06c3e6f1067ee40b5f51099641b
-
SHA1
e5b20e7ba7f743c6ee52ea10ddf5a566edde3921
-
SHA256
8297282352f3f5faa925a8d7913c3750dcebb5dc6668b5b5e6e3331081717baa
-
SHA512
7f86af8e77e3fad8be77df30a615444b2195e79bdc1cb1db6094a81984fc69822a37fcb9a2ec6641a00e65972fca66c4909e98e2142eda6f4b6a13d77f20e8d4
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qD:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPp
Static task
static1
Behavioral task
behavioral1
Sample
8297282352f3f5faa925a8d7913c3750dcebb5dc6668b5b5e6e3331081717baa.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
8297282352f3f5faa925a8d7913c3750dcebb5dc6668b5b5e6e3331081717baa
-
Size
956KB
-
MD5
9881f06c3e6f1067ee40b5f51099641b
-
SHA1
e5b20e7ba7f743c6ee52ea10ddf5a566edde3921
-
SHA256
8297282352f3f5faa925a8d7913c3750dcebb5dc6668b5b5e6e3331081717baa
-
SHA512
7f86af8e77e3fad8be77df30a615444b2195e79bdc1cb1db6094a81984fc69822a37fcb9a2ec6641a00e65972fca66c4909e98e2142eda6f4b6a13d77f20e8d4
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qD:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPp
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-