General
-
Target
b1f34b40964b4108d8bd6be65cb8e0abd746ae6cf45730b2e0f9ddffc6070c9a
-
Size
1.1MB
-
Sample
230129-zymb7ach87
-
MD5
a7af472527c6c611daceff4959cbd9e7
-
SHA1
f94ef7012565e6238c53c85432bd2896afe4dd2d
-
SHA256
b1f34b40964b4108d8bd6be65cb8e0abd746ae6cf45730b2e0f9ddffc6070c9a
-
SHA512
f7132c7240bcaf498b9a5c7efe08b5b1796bf17a6730dec8e3f029a5cdc733ab3a0b409b6d8d3e52fb2c03267159337ed6c4551260ec6d43c8dc71e7c554b2bf
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69iTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4x
Static task
static1
Behavioral task
behavioral1
Sample
b1f34b40964b4108d8bd6be65cb8e0abd746ae6cf45730b2e0f9ddffc6070c9a.dll
Resource
win7-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
b1f34b40964b4108d8bd6be65cb8e0abd746ae6cf45730b2e0f9ddffc6070c9a
-
Size
1.1MB
-
MD5
a7af472527c6c611daceff4959cbd9e7
-
SHA1
f94ef7012565e6238c53c85432bd2896afe4dd2d
-
SHA256
b1f34b40964b4108d8bd6be65cb8e0abd746ae6cf45730b2e0f9ddffc6070c9a
-
SHA512
f7132c7240bcaf498b9a5c7efe08b5b1796bf17a6730dec8e3f029a5cdc733ab3a0b409b6d8d3e52fb2c03267159337ed6c4551260ec6d43c8dc71e7c554b2bf
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69iTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4x
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-