General
-
Target
c4c388a9a021312572119762cae1dae756e6b54702d82e7ab3a0363029585237
-
Size
956KB
-
Sample
230129-wczhvafh75
-
MD5
b58088df458bfed8a49a778387451a44
-
SHA1
d5f26043c6c18d0af903e04acc3ebdd0815d6041
-
SHA256
c4c388a9a021312572119762cae1dae756e6b54702d82e7ab3a0363029585237
-
SHA512
7f190cc944ce416808fa426ff67b01abe0c4a65758f9e530e9a704cf70899787a150d3a73ee43be4f37832b27822ba980ed77b3ee68be771459d483a9e5839eb
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qB:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPL
Static task
static1
Behavioral task
behavioral1
Sample
c4c388a9a021312572119762cae1dae756e6b54702d82e7ab3a0363029585237.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
c4c388a9a021312572119762cae1dae756e6b54702d82e7ab3a0363029585237
-
Size
956KB
-
MD5
b58088df458bfed8a49a778387451a44
-
SHA1
d5f26043c6c18d0af903e04acc3ebdd0815d6041
-
SHA256
c4c388a9a021312572119762cae1dae756e6b54702d82e7ab3a0363029585237
-
SHA512
7f190cc944ce416808fa426ff67b01abe0c4a65758f9e530e9a704cf70899787a150d3a73ee43be4f37832b27822ba980ed77b3ee68be771459d483a9e5839eb
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qB:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-