General
-
Target
cb955910aae17348d64f2e35f9bf5acfed96126ca146b34d3d11b2cc810ccbf2
-
Size
956KB
-
Sample
230129-wcyljsfh74
-
MD5
07cdbad905bb9ca35c38ab02cf116888
-
SHA1
2cca754866671a7cd40444c96610b7b5abf05a01
-
SHA256
cb955910aae17348d64f2e35f9bf5acfed96126ca146b34d3d11b2cc810ccbf2
-
SHA512
b0fc2bc45f24c921453eb07297882e69a546cba37bf8f661098ff030fdf0a28733db672d569af46641e129e636ebc3f2f316a750919177bc738113fa8a484ff9
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qT:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPJ
Static task
static1
Behavioral task
behavioral1
Sample
cb955910aae17348d64f2e35f9bf5acfed96126ca146b34d3d11b2cc810ccbf2.dll
Resource
win7-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
cb955910aae17348d64f2e35f9bf5acfed96126ca146b34d3d11b2cc810ccbf2
-
Size
956KB
-
MD5
07cdbad905bb9ca35c38ab02cf116888
-
SHA1
2cca754866671a7cd40444c96610b7b5abf05a01
-
SHA256
cb955910aae17348d64f2e35f9bf5acfed96126ca146b34d3d11b2cc810ccbf2
-
SHA512
b0fc2bc45f24c921453eb07297882e69a546cba37bf8f661098ff030fdf0a28733db672d569af46641e129e636ebc3f2f316a750919177bc738113fa8a484ff9
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qT:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPJ
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-