General
-
Target
7.jpg
-
Size
293KB
-
Sample
230428-ttpzmafb43
-
MD5
d4092e20ce7bb98d051fae3e21fd7fa7
-
SHA1
130237f202116c8a7ceef5066d162116649d6fce
-
SHA256
f71601c9b12a4836da504f488def0bb7ce823c64fa6a1678ef2dd275e01ff04e
-
SHA512
7e4f0602ee489c7fe12115f4bc49c9dda7660aaf07e66753980720c4cf80814205610f0b3f19c195416d619cd4df766011cf7fa7c96d425e128c8a344faac22a
-
SSDEEP
3072:ptkKMYvhj8NLuJCZu+97LJYIaVlYtWJU3cYXtz2+ZvbA3cub/j3PEgbAC3KRX:ptjMqjmSSuALSHY8+Zvgb/jJDKR
Static task
static1
Behavioral task
behavioral1
Sample
7.dll
Resource
win7-20230220-en
Malware Config
Extracted
gozi
1000
https://bamukal.top
-
host_keep_time
2
-
host_shift_time
1
-
idle_time
1
-
request_time
10
Targets
-
-
Target
7.jpg
-
Size
293KB
-
MD5
d4092e20ce7bb98d051fae3e21fd7fa7
-
SHA1
130237f202116c8a7ceef5066d162116649d6fce
-
SHA256
f71601c9b12a4836da504f488def0bb7ce823c64fa6a1678ef2dd275e01ff04e
-
SHA512
7e4f0602ee489c7fe12115f4bc49c9dda7660aaf07e66753980720c4cf80814205610f0b3f19c195416d619cd4df766011cf7fa7c96d425e128c8a344faac22a
-
SSDEEP
3072:ptkKMYvhj8NLuJCZu+97LJYIaVlYtWJU3cYXtz2+ZvbA3cub/j3PEgbAC3KRX:ptjMqjmSSuALSHY8+Zvgb/jJDKR
-
Blocklisted process makes network request
-