General
-
Target
b22f11cbda6d1a853a78d86599d8801508914408438c5e29844afe1e8072f3a0
-
Size
822KB
-
Sample
230129-wcla8afh65
-
MD5
b8abf717b75fcb858ac0c558cb1bf1ca
-
SHA1
f145bc38bb53ebfdcac176e3fcf76572c0d175c4
-
SHA256
b22f11cbda6d1a853a78d86599d8801508914408438c5e29844afe1e8072f3a0
-
SHA512
a8a8fecd097e70c55e52a133dc7d1d8033dc367a1d8cd3232ddb04194c9eb51ccbef80297796f39bef259987eded50358d24b55ae0d22ac9cb1ac0e9d0b5a3f5
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDeXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpe3UmSSIOKm2mR5xWwN5
Static task
static1
Behavioral task
behavioral1
Sample
b22f11cbda6d1a853a78d86599d8801508914408438c5e29844afe1e8072f3a0.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://news-deck.at
http://taslks.at
http://living-start.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
b22f11cbda6d1a853a78d86599d8801508914408438c5e29844afe1e8072f3a0
-
Size
822KB
-
MD5
b8abf717b75fcb858ac0c558cb1bf1ca
-
SHA1
f145bc38bb53ebfdcac176e3fcf76572c0d175c4
-
SHA256
b22f11cbda6d1a853a78d86599d8801508914408438c5e29844afe1e8072f3a0
-
SHA512
a8a8fecd097e70c55e52a133dc7d1d8033dc367a1d8cd3232ddb04194c9eb51ccbef80297796f39bef259987eded50358d24b55ae0d22ac9cb1ac0e9d0b5a3f5
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDeXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpe3UmSSIOKm2mR5xWwN5
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-