General
-
Target
2208c35df300eee92ed44119eef73d0462a8b556aa9d2e235503d718b5961345
-
Size
1.1MB
-
Sample
230129-zyx4paed3x
-
MD5
6b4640270bfa9629a0d6eba806873cc5
-
SHA1
8a8304f960b8e5c6f6e779d9b686d7faddddb764
-
SHA256
2208c35df300eee92ed44119eef73d0462a8b556aa9d2e235503d718b5961345
-
SHA512
6ca002b90a62dbd2da1ed8b44e1d55973ccf14470c3ed31b4e60db7b13fe11f6a705ca00cf2cfac0de34e9b2634996996a41c2b90cc2cca4c6de881c2a400805
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69tTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4+
Static task
static1
Behavioral task
behavioral1
Sample
2208c35df300eee92ed44119eef73d0462a8b556aa9d2e235503d718b5961345.dll
Resource
win7-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://drunt.at
http://news-deck.at
http://taslks.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
2208c35df300eee92ed44119eef73d0462a8b556aa9d2e235503d718b5961345
-
Size
1.1MB
-
MD5
6b4640270bfa9629a0d6eba806873cc5
-
SHA1
8a8304f960b8e5c6f6e779d9b686d7faddddb764
-
SHA256
2208c35df300eee92ed44119eef73d0462a8b556aa9d2e235503d718b5961345
-
SHA512
6ca002b90a62dbd2da1ed8b44e1d55973ccf14470c3ed31b4e60db7b13fe11f6a705ca00cf2cfac0de34e9b2634996996a41c2b90cc2cca4c6de881c2a400805
-
SSDEEP
24576:i30ixqmP/+GZgTXrHJB+pffKUmHaRLNW0wfpKncbBWZtxjB/s69tTGxUcbrJOBPO:i30ixj/aTXrH7+pHKUmHeLNW0wBKnc4+
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-