Behavioral task
behavioral1
Sample
45947873301645fa58c8243a3d9df9bdd866bf8fbeb085b3484de71d09957c43.exe
Resource
win10-20230703-it
Behavioral task
behavioral2
Sample
45947873301645fa58c8243a3d9df9bdd866bf8fbeb085b3484de71d09957c43.exe
Resource
win10v2004-20230703-it
General
-
Target
45947873301645fa58c8243a3d9df9bdd866bf8fbeb085b3484de71d09957c43
-
Size
60KB
-
MD5
80a7b83c8afe43ae666118cd7a5e1e7e
-
SHA1
2257ab264880bc99d6ef37665a12df4348aff42e
-
SHA256
45947873301645fa58c8243a3d9df9bdd866bf8fbeb085b3484de71d09957c43
-
SHA512
10893b997c853e92b9e4b005a41cdd421f7318465b7418587d2ee86b7e714f39e092f861c94df25e98d94221715b57e8cfb0754eb076ad4329d85bb78a7aefb4
-
SSDEEP
1536:O3rPI5jSu13c89ZFpXnaHeaD5VBmUmurTtB:crPI5jSu13b3aHZ5VYnurTtB
Malware Config
Extracted
gozi
Extracted
gozi
555000
http://185.212.47.65
http://45.155.249.172
http://78.138.9.136
http://79.132.130.230
https://listwhfite.check3.yaho1o.com
https://lisfwhite.ch2eck.yaheoo.com
http://45.155.250.58
https://liset.che3ck.bi1ng.com
http://45.155.249.91
-
base_path
/zerotohero/
-
build
250260
-
exe_type
loader
-
extension
.asi
-
server_id
50
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 45947873301645fa58c8243a3d9df9bdd866bf8fbeb085b3484de71d09957c43
Files
-
45947873301645fa58c8243a3d9df9bdd866bf8fbeb085b3484de71d09957c43.exe windows x86
1640d668d1471f340cbe565fe63522f6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_snwprintf
memset
NtQuerySystemInformation
_aulldiv
kernel32
GetModuleHandleA
GetLocaleInfoA
GetSystemDefaultUILanguage
HeapAlloc
HeapFree
WaitForSingleObject
Sleep
ExitThread
lstrlenW
GetLastError
VerLanguageNameA
GetExitCodeThread
CloseHandle
HeapCreate
HeapDestroy
GetCommandLineW
ExitProcess
SetLastError
TerminateThread
SleepEx
GetModuleFileNameW
CreateThread
OpenProcess
CreateEventA
GetLongPathNameW
GetVersion
GetCurrentProcessId
GetProcAddress
LoadLibraryA
VirtualProtect
MapViewOfFile
GetSystemTimeAsFileTime
CreateFileMappingW
QueueUserAPC
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ