General
-
Target
90c9eabcba15f24fc7ad64eae4e44bcd94f20cef5bfd97ed64e6b1c24453149c
-
Size
822KB
-
Sample
230129-wcpnmshc9t
-
MD5
cba93ea3df70100fef8f06e69e2ef874
-
SHA1
bfd3f24734b462b6db654afeb2858618f25e03f2
-
SHA256
90c9eabcba15f24fc7ad64eae4e44bcd94f20cef5bfd97ed64e6b1c24453149c
-
SHA512
c779f0e6785c7178afcbecd2a1ba9822725b33d81d8801b44d70ae2294abc8143808038e643cc070d8d50850e5fad979eb79cca657676aaf955964974fe87a7f
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdD8XiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWp83UmSSIOKm2mR5xWwN5
Static task
static1
Behavioral task
behavioral1
Sample
90c9eabcba15f24fc7ad64eae4e44bcd94f20cef5bfd97ed64e6b1c24453149c.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://news-deck.at
http://taslks.at
http://living-start.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
90c9eabcba15f24fc7ad64eae4e44bcd94f20cef5bfd97ed64e6b1c24453149c
-
Size
822KB
-
MD5
cba93ea3df70100fef8f06e69e2ef874
-
SHA1
bfd3f24734b462b6db654afeb2858618f25e03f2
-
SHA256
90c9eabcba15f24fc7ad64eae4e44bcd94f20cef5bfd97ed64e6b1c24453149c
-
SHA512
c779f0e6785c7178afcbecd2a1ba9822725b33d81d8801b44d70ae2294abc8143808038e643cc070d8d50850e5fad979eb79cca657676aaf955964974fe87a7f
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdD8XiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWp83UmSSIOKm2mR5xWwN5
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-