General
-
Target
222ff388894e6cba9fa71d721352bb091e0aa198d939596157d890ac4f854f79
-
Size
822KB
-
Sample
230129-wctycshc9w
-
MD5
a085f44c3fb03503d508c947a75c0afd
-
SHA1
22c3509e15f5ba4959aaaec274f0c370ccf553e0
-
SHA256
222ff388894e6cba9fa71d721352bb091e0aa198d939596157d890ac4f854f79
-
SHA512
60912822e561dbb7d1df4cc969fc453441b20d4fbb7ee1e11de456053ab9732c2c8d41b2161a10abe837b2dc06b39b1a25fdad3f5a0096b4cd0e6542e056b5c6
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDWXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpW3UmSSIOKm2mR5xWwN5
Static task
static1
Behavioral task
behavioral1
Sample
222ff388894e6cba9fa71d721352bb091e0aa198d939596157d890ac4f854f79.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://news-deck.at
http://taslks.at
http://living-start.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
222ff388894e6cba9fa71d721352bb091e0aa198d939596157d890ac4f854f79
-
Size
822KB
-
MD5
a085f44c3fb03503d508c947a75c0afd
-
SHA1
22c3509e15f5ba4959aaaec274f0c370ccf553e0
-
SHA256
222ff388894e6cba9fa71d721352bb091e0aa198d939596157d890ac4f854f79
-
SHA512
60912822e561dbb7d1df4cc969fc453441b20d4fbb7ee1e11de456053ab9732c2c8d41b2161a10abe837b2dc06b39b1a25fdad3f5a0096b4cd0e6542e056b5c6
-
SSDEEP
12288:R4M/vPufq2ORdooOdSgWrdDWXiglWjw9SAcqP2W5OEhuAwc84b2mzd5x6dlGN5:RP3RdNhgWpW3UmSSIOKm2mR5xWwN5
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-