General
-
Target
33f956cc16a47c86ec3c06f30da058a87bab41c5b9deab097ae876067d2d5e2a
-
Size
1.1MB
-
Sample
230129-zywkvsed3v
-
MD5
a8d1899b7942eecddb5a18b0f6b509df
-
SHA1
342cdb7f538fd2213ad33f673433bafba85c4b4b
-
SHA256
33f956cc16a47c86ec3c06f30da058a87bab41c5b9deab097ae876067d2d5e2a
-
SHA512
924682746c7185b9852d226f63c5082d023865f0a3c293569eef100f7c60df9f5bcb848a3ae8cf52d7d16f0059c936f725622574190ba89f7654c304a4687068
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69vTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4c
Static task
static1
Behavioral task
behavioral1
Sample
33f956cc16a47c86ec3c06f30da058a87bab41c5b9deab097ae876067d2d5e2a.dll
Resource
win7-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
33f956cc16a47c86ec3c06f30da058a87bab41c5b9deab097ae876067d2d5e2a
-
Size
1.1MB
-
MD5
a8d1899b7942eecddb5a18b0f6b509df
-
SHA1
342cdb7f538fd2213ad33f673433bafba85c4b4b
-
SHA256
33f956cc16a47c86ec3c06f30da058a87bab41c5b9deab097ae876067d2d5e2a
-
SHA512
924682746c7185b9852d226f63c5082d023865f0a3c293569eef100f7c60df9f5bcb848a3ae8cf52d7d16f0059c936f725622574190ba89f7654c304a4687068
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69vTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4c
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-