General
-
Target
a2eb302225f708ebb4876ee1057e42e0ef51e460943d124d14768431ee4369f2
-
Size
822KB
-
Sample
230129-wclxrafh66
-
MD5
c21ac4b534eb7d9f1c652e6999fdaa82
-
SHA1
af10378d159b4e2c4440adb66a7e74ff582f65fc
-
SHA256
a2eb302225f708ebb4876ee1057e42e0ef51e460943d124d14768431ee4369f2
-
SHA512
1e6a6cbdaaf7a685f24710f03d926c4aee35eccbc111591a258c085732dbd8864b42609829eb56d3c687731fad7885e0c49f6c3c24e14c2e4be04aa273dba1c4
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDGXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpG3UmSSIOKm2mR5xWwN5
Static task
static1
Behavioral task
behavioral1
Sample
a2eb302225f708ebb4876ee1057e42e0ef51e460943d124d14768431ee4369f2.dll
Resource
win7-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://news-deck.at
http://taslks.at
http://living-start.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
a2eb302225f708ebb4876ee1057e42e0ef51e460943d124d14768431ee4369f2
-
Size
822KB
-
MD5
c21ac4b534eb7d9f1c652e6999fdaa82
-
SHA1
af10378d159b4e2c4440adb66a7e74ff582f65fc
-
SHA256
a2eb302225f708ebb4876ee1057e42e0ef51e460943d124d14768431ee4369f2
-
SHA512
1e6a6cbdaaf7a685f24710f03d926c4aee35eccbc111591a258c085732dbd8864b42609829eb56d3c687731fad7885e0c49f6c3c24e14c2e4be04aa273dba1c4
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDGXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpG3UmSSIOKm2mR5xWwN5
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-