General
-
Target
300e4b06468b1fe1271a3f42de7e9fcacdf33bec570a47877989104fe952d7d0
-
Size
956KB
-
Sample
230129-wddmrsfh89
-
MD5
b7a59dc2ce7cab6bbbd1a8fc51c71681
-
SHA1
52751848ca4804961cc098601ee83473add2ef0c
-
SHA256
300e4b06468b1fe1271a3f42de7e9fcacdf33bec570a47877989104fe952d7d0
-
SHA512
d72a1da7457d55a5ab2c8dd7eeb2387cfed0bae24cbe5aa7b1fa08439b9aea34de360053f4f8836ba7c9e6ce340f24bd4b6896a24555fda3b98727b7bbd901a0
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qm:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPE
Static task
static1
Behavioral task
behavioral1
Sample
300e4b06468b1fe1271a3f42de7e9fcacdf33bec570a47877989104fe952d7d0.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
300e4b06468b1fe1271a3f42de7e9fcacdf33bec570a47877989104fe952d7d0
-
Size
956KB
-
MD5
b7a59dc2ce7cab6bbbd1a8fc51c71681
-
SHA1
52751848ca4804961cc098601ee83473add2ef0c
-
SHA256
300e4b06468b1fe1271a3f42de7e9fcacdf33bec570a47877989104fe952d7d0
-
SHA512
d72a1da7457d55a5ab2c8dd7eeb2387cfed0bae24cbe5aa7b1fa08439b9aea34de360053f4f8836ba7c9e6ce340f24bd4b6896a24555fda3b98727b7bbd901a0
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qm:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-