General
-
Target
cf02e41d766f6bb939db30b8f43beaf6052ff3fed4279d4382e0ef4496bda71e
-
Size
1.1MB
-
Sample
230129-zykhlach85
-
MD5
c034d33b6957b0002c774ea180da90cb
-
SHA1
391f59c7ab9b47ea83030557c64fb30a90229943
-
SHA256
cf02e41d766f6bb939db30b8f43beaf6052ff3fed4279d4382e0ef4496bda71e
-
SHA512
ac2a28df7b2cb2bad894afab98d21f0474f3c783073fbc8b8d078c7eb80d1b51f0fb960b3e617fd479d4e2ea158396fc2256df97f34efc3a554c1a0703fb9acb
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69DTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4
Static task
static1
Behavioral task
behavioral1
Sample
cf02e41d766f6bb939db30b8f43beaf6052ff3fed4279d4382e0ef4496bda71e.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
cf02e41d766f6bb939db30b8f43beaf6052ff3fed4279d4382e0ef4496bda71e
-
Size
1.1MB
-
MD5
c034d33b6957b0002c774ea180da90cb
-
SHA1
391f59c7ab9b47ea83030557c64fb30a90229943
-
SHA256
cf02e41d766f6bb939db30b8f43beaf6052ff3fed4279d4382e0ef4496bda71e
-
SHA512
ac2a28df7b2cb2bad894afab98d21f0474f3c783073fbc8b8d078c7eb80d1b51f0fb960b3e617fd479d4e2ea158396fc2256df97f34efc3a554c1a0703fb9acb
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69DTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-