Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2023 06:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230831-en
windows7-x64
2 signatures
150 seconds
General
-
Target
Client.exe
-
Size
181KB
-
MD5
e54d9f8d9757fe6eead98ab59bd59ffa
-
SHA1
60c8766682b968d9367f9099378f2c9f0ed07278
-
SHA256
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6
-
SHA512
b362675e7c21b0336ed5844ed453334bd93257ea6901fed5b532d06db54ad775c33c17c753414f34c8c9117ce38cc072a4b59deeb7add1ea76b63183948f511e
-
SSDEEP
3072:+gZW8+P3NtOTH8CG95Ja4tXybaVLbPkxAgaX6wwzCqIg9:+SWfPLOL85hlVfjRSIg9
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
netsecurez.com
whofoxy.com
mimemoa.com
ntcgo.com
Attributes
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
-
Dave packer 1 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/4884-1-0x0000000000EF0000-0x0000000000EFC000-memory.dmp dave
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4884-0-0x0000000000F00000-0x0000000000F0F000-memory.dmpFilesize
60KB
-
memory/4884-1-0x0000000000EF0000-0x0000000000EFC000-memory.dmpFilesize
48KB
-
memory/4884-5-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/4884-11-0x0000000000F70000-0x0000000000F7D000-memory.dmpFilesize
52KB