General
-
Target
68c432acf13a91be7865621d5e6300da18d0c1d89589fbccb58b370df1aecf34
-
Size
1.1MB
-
Sample
230129-zyqplsed3s
-
MD5
a5e27d0d90056b98056cc8119eee25cf
-
SHA1
f1cb8b468cd6947785594ef4de17d18afe24b3af
-
SHA256
68c432acf13a91be7865621d5e6300da18d0c1d89589fbccb58b370df1aecf34
-
SHA512
e6cf0edaf9c0c3a8caa8eff1bc43ab993f51de2890b4764c1839086ab26cb45a7f23a75cafc7562135551cf3a279938e083ab6f6130e3688c29d4e5aa2abdd57
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69ZTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4a
Static task
static1
Behavioral task
behavioral1
Sample
68c432acf13a91be7865621d5e6300da18d0c1d89589fbccb58b370df1aecf34.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
68c432acf13a91be7865621d5e6300da18d0c1d89589fbccb58b370df1aecf34
-
Size
1.1MB
-
MD5
a5e27d0d90056b98056cc8119eee25cf
-
SHA1
f1cb8b468cd6947785594ef4de17d18afe24b3af
-
SHA256
68c432acf13a91be7865621d5e6300da18d0c1d89589fbccb58b370df1aecf34
-
SHA512
e6cf0edaf9c0c3a8caa8eff1bc43ab993f51de2890b4764c1839086ab26cb45a7f23a75cafc7562135551cf3a279938e083ab6f6130e3688c29d4e5aa2abdd57
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69ZTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4a
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-