General
-
Target
bc9dde8bb458ec900432c0927142210464bd6fdd2ded3423b7e8261fc6c06dc3
-
Size
822KB
-
Sample
230129-wckdxshc81
-
MD5
9bf48054380267d5f07b506743c28551
-
SHA1
7a53e61c8354bee575732aa624fb82e661147c06
-
SHA256
bc9dde8bb458ec900432c0927142210464bd6fdd2ded3423b7e8261fc6c06dc3
-
SHA512
ef466a96e783e03ac4924118e6b2f88dd211c78127dba94a31675864702232a9af6baba74eb6c38f5523ead7c8523721affefb6c81798a95e96526c58163c3d3
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDzXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpz3UmSSIOKm2mR5xWwN5
Static task
static1
Behavioral task
behavioral1
Sample
bc9dde8bb458ec900432c0927142210464bd6fdd2ded3423b7e8261fc6c06dc3.dll
Resource
win7-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://news-deck.at
http://taslks.at
http://living-start.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
bc9dde8bb458ec900432c0927142210464bd6fdd2ded3423b7e8261fc6c06dc3
-
Size
822KB
-
MD5
9bf48054380267d5f07b506743c28551
-
SHA1
7a53e61c8354bee575732aa624fb82e661147c06
-
SHA256
bc9dde8bb458ec900432c0927142210464bd6fdd2ded3423b7e8261fc6c06dc3
-
SHA512
ef466a96e783e03ac4924118e6b2f88dd211c78127dba94a31675864702232a9af6baba74eb6c38f5523ead7c8523721affefb6c81798a95e96526c58163c3d3
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDzXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpz3UmSSIOKm2mR5xWwN5
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-