General
-
Target
f6dd1a66a639aab5f315b27e52908162bdc4ae55b0ac2325d4b1d81ba1afce58
-
Size
956KB
-
Sample
230129-wcv6eshc9z
-
MD5
3c30ff520fc3c7ca71dd394d16fa3e7b
-
SHA1
c0aff19dbaf5b1cb477c5c59478e803ac65c7b8c
-
SHA256
f6dd1a66a639aab5f315b27e52908162bdc4ae55b0ac2325d4b1d81ba1afce58
-
SHA512
c961cbcdeabfafcd5aa1624c8404f7e2e44fabbf451121327ce4b8c6cf10e0aba989bc31a5bfc85bd459acc04fea88deaaecf94af22cd718795002af1333daeb
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qF:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPv
Static task
static1
Behavioral task
behavioral1
Sample
f6dd1a66a639aab5f315b27e52908162bdc4ae55b0ac2325d4b1d81ba1afce58.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
f6dd1a66a639aab5f315b27e52908162bdc4ae55b0ac2325d4b1d81ba1afce58
-
Size
956KB
-
MD5
3c30ff520fc3c7ca71dd394d16fa3e7b
-
SHA1
c0aff19dbaf5b1cb477c5c59478e803ac65c7b8c
-
SHA256
f6dd1a66a639aab5f315b27e52908162bdc4ae55b0ac2325d4b1d81ba1afce58
-
SHA512
c961cbcdeabfafcd5aa1624c8404f7e2e44fabbf451121327ce4b8c6cf10e0aba989bc31a5bfc85bd459acc04fea88deaaecf94af22cd718795002af1333daeb
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qF:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPv
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-