General
-
Target
eb16b6665115b8823a47c6cf2e61405459c7460f80011aa0fe24fef59dd29a66
-
Size
469KB
-
Sample
230828-xe1pcshf8w
-
MD5
53253db5ff9d00f85d2dfd6f3a25fb62
-
SHA1
71a72beaae92a83a5912a4cb2af301259e15473b
-
SHA256
eb16b6665115b8823a47c6cf2e61405459c7460f80011aa0fe24fef59dd29a66
-
SHA512
f84be54a85f6224bb2d89cda98ca67ef59622d24a40162b36518ac71352184616c531551c7b4a73479eafbbdeeae7bce590647e3c381badbad3a008ba6a5214a
-
SSDEEP
6144:qdjkmnzdHALJUif3wgYzhNBXGoAKvxOnbOhUQOahb6Wfdu5g8kRC:qPzdIeiPwX1NBXGAabO5NgWfST
Static task
static1
Behavioral task
behavioral1
Sample
eb16b6665115b8823a47c6cf2e61405459c7460f80011aa0fe24fef59dd29a66.exe
Resource
win7-20230712-en
Malware Config
Extracted
gozi
Extracted
gozi
6000
config.edge.skype.com
onlinetwork.top
linetwork.top
mmmmmm.bar
-
base_path
/drew/
-
build
250246
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
eb16b6665115b8823a47c6cf2e61405459c7460f80011aa0fe24fef59dd29a66
-
Size
469KB
-
MD5
53253db5ff9d00f85d2dfd6f3a25fb62
-
SHA1
71a72beaae92a83a5912a4cb2af301259e15473b
-
SHA256
eb16b6665115b8823a47c6cf2e61405459c7460f80011aa0fe24fef59dd29a66
-
SHA512
f84be54a85f6224bb2d89cda98ca67ef59622d24a40162b36518ac71352184616c531551c7b4a73479eafbbdeeae7bce590647e3c381badbad3a008ba6a5214a
-
SSDEEP
6144:qdjkmnzdHALJUif3wgYzhNBXGoAKvxOnbOhUQOahb6Wfdu5g8kRC:qPzdIeiPwX1NBXGAabO5NgWfST
-
Suspicious use of SetThreadContext
-