General
-
Target
eba1ce4d16eebf23a29d4d2ef10a69474d271d2851758f82fd9975a75b0ca9ea
-
Size
1.1MB
-
Sample
230129-zyhzrsch84
-
MD5
9d466161d5dde02bdf338c3151654db4
-
SHA1
6ddb9a8649a780a15a2f9b7d64262260d9c4a534
-
SHA256
eba1ce4d16eebf23a29d4d2ef10a69474d271d2851758f82fd9975a75b0ca9ea
-
SHA512
c868aa61f52ba125a7237b223f7d2a2801224e7dca34027abde2ff7b0785f2410194eb58df068a925d6bdea0305ee4d9a23072c110eb14d7c18c99c61aeb36bb
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69/TGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc48
Static task
static1
Behavioral task
behavioral1
Sample
eba1ce4d16eebf23a29d4d2ef10a69474d271d2851758f82fd9975a75b0ca9ea.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
eba1ce4d16eebf23a29d4d2ef10a69474d271d2851758f82fd9975a75b0ca9ea
-
Size
1.1MB
-
MD5
9d466161d5dde02bdf338c3151654db4
-
SHA1
6ddb9a8649a780a15a2f9b7d64262260d9c4a534
-
SHA256
eba1ce4d16eebf23a29d4d2ef10a69474d271d2851758f82fd9975a75b0ca9ea
-
SHA512
c868aa61f52ba125a7237b223f7d2a2801224e7dca34027abde2ff7b0785f2410194eb58df068a925d6bdea0305ee4d9a23072c110eb14d7c18c99c61aeb36bb
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69/TGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc48
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-