General
-
Target
5c38f0d0f4ba51be372052cd2b37230d8ad25df6e61a3fb15ff47434901e9218
-
Size
956KB
-
Sample
230129-wdak4sfh85
-
MD5
869a664a1d37b65011e8be05b7e51cc3
-
SHA1
bcd6f85d9c8cc781988ee7eb12ab84aa8e9bb46c
-
SHA256
5c38f0d0f4ba51be372052cd2b37230d8ad25df6e61a3fb15ff47434901e9218
-
SHA512
7f2b126fea130048e42e3c2196de9f52fad574d6d0b295d7a790c197dc1ea623b3f9f0c8c2e16a4609d682e979b7ea6aee450521ec97d92f282252a16175b0e6
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qf:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPd
Static task
static1
Behavioral task
behavioral1
Sample
5c38f0d0f4ba51be372052cd2b37230d8ad25df6e61a3fb15ff47434901e9218.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
5c38f0d0f4ba51be372052cd2b37230d8ad25df6e61a3fb15ff47434901e9218
-
Size
956KB
-
MD5
869a664a1d37b65011e8be05b7e51cc3
-
SHA1
bcd6f85d9c8cc781988ee7eb12ab84aa8e9bb46c
-
SHA256
5c38f0d0f4ba51be372052cd2b37230d8ad25df6e61a3fb15ff47434901e9218
-
SHA512
7f2b126fea130048e42e3c2196de9f52fad574d6d0b295d7a790c197dc1ea623b3f9f0c8c2e16a4609d682e979b7ea6aee450521ec97d92f282252a16175b0e6
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qf:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPd
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-