Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 13:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
201752c6d4a98d6dc6a693beade4f30097347d1472147b59bed1a4fd91d817cd.dll
Resource
win7-20230712-en
2 signatures
150 seconds
General
-
Target
201752c6d4a98d6dc6a693beade4f30097347d1472147b59bed1a4fd91d817cd.dll
-
Size
492KB
-
MD5
83a4b9b0266a30e52d51aef5317067be
-
SHA1
914f2275fa5c061a0bcb8c2b2f094645bda27575
-
SHA256
201752c6d4a98d6dc6a693beade4f30097347d1472147b59bed1a4fd91d817cd
-
SHA512
f9391e5d3ff7cf4242d1513724ecdf863391e5a7c489443392f8964e24ad75e883f65d01e84b372faba43e4923dff9890e6d3764d2b6ded031726ce91fe57a56
-
SSDEEP
6144:gtkZIOdi1a/nGAHSzssd4BxrobrVvEp5HH6ZUNCVcj9lVMJ:ZIuiA/nry9u8HU8UNGA9lVM
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
config.edge.skype.com
optinetwork.top
interspin.top
dendexmm.com
Attributes
-
base_path
/jerry/
-
build
250249
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 5072 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1140 wrote to memory of 5072 1140 rundll32.exe 83 PID 1140 wrote to memory of 5072 1140 rundll32.exe 83 PID 1140 wrote to memory of 5072 1140 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\201752c6d4a98d6dc6a693beade4f30097347d1472147b59bed1a4fd91d817cd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\201752c6d4a98d6dc6a693beade4f30097347d1472147b59bed1a4fd91d817cd.dll,#12⤵
- Blocklisted process makes network request
PID:5072
-