General
-
Target
4f8369b4b67d45b7edf0ad022996a4bad6e49659bf873b7ea6425e37f5bdc15d
-
Size
1.1MB
-
Sample
230129-zysh7sch93
-
MD5
ce3caf597b8033e4b6f9ca4dcf358c96
-
SHA1
33572e4206dda16fb00cc76be3e322e8f536b39a
-
SHA256
4f8369b4b67d45b7edf0ad022996a4bad6e49659bf873b7ea6425e37f5bdc15d
-
SHA512
4b8fd2700a6e3a3ff2f52bbc61a61d15f5069e0177d42335d03e30aa1654ea74e1d92ab6b686bba2fbb7c742a6dc12d92c23f23f98620d13f171b603048a22ad
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69yTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4h
Static task
static1
Behavioral task
behavioral1
Sample
4f8369b4b67d45b7edf0ad022996a4bad6e49659bf873b7ea6425e37f5bdc15d.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
4f8369b4b67d45b7edf0ad022996a4bad6e49659bf873b7ea6425e37f5bdc15d
-
Size
1.1MB
-
MD5
ce3caf597b8033e4b6f9ca4dcf358c96
-
SHA1
33572e4206dda16fb00cc76be3e322e8f536b39a
-
SHA256
4f8369b4b67d45b7edf0ad022996a4bad6e49659bf873b7ea6425e37f5bdc15d
-
SHA512
4b8fd2700a6e3a3ff2f52bbc61a61d15f5069e0177d42335d03e30aa1654ea74e1d92ab6b686bba2fbb7c742a6dc12d92c23f23f98620d13f171b603048a22ad
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69yTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4h
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-