General
-
Target
79c7af506f874416531ea6b08fcdee9d776f21eca64a94674ec52ff4f5a8c5bf
-
Size
956KB
-
Sample
230129-wc83aafh83
-
MD5
e20a967142b694364f86ddde7ba14bea
-
SHA1
88a41bc2dac7f3203cb198755b6b54378492379a
-
SHA256
79c7af506f874416531ea6b08fcdee9d776f21eca64a94674ec52ff4f5a8c5bf
-
SHA512
9121daaf1a634629fc0f21eb4a2d2b7d66d5a20d6f8655432354127af487918a260808c00938584d84e61df50a4656f6b8ae8cbbdafa035b315ad36937ea31bc
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qs:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPy
Static task
static1
Behavioral task
behavioral1
Sample
79c7af506f874416531ea6b08fcdee9d776f21eca64a94674ec52ff4f5a8c5bf.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
79c7af506f874416531ea6b08fcdee9d776f21eca64a94674ec52ff4f5a8c5bf
-
Size
956KB
-
MD5
e20a967142b694364f86ddde7ba14bea
-
SHA1
88a41bc2dac7f3203cb198755b6b54378492379a
-
SHA256
79c7af506f874416531ea6b08fcdee9d776f21eca64a94674ec52ff4f5a8c5bf
-
SHA512
9121daaf1a634629fc0f21eb4a2d2b7d66d5a20d6f8655432354127af487918a260808c00938584d84e61df50a4656f6b8ae8cbbdafa035b315ad36937ea31bc
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qs:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPy
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-