Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2023 18:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
108b8215bfc3a88cf529046b592858d0f80810e76a48b3090d57a73acd3f04f5_JC.exe
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
108b8215bfc3a88cf529046b592858d0f80810e76a48b3090d57a73acd3f04f5_JC.exe
-
Size
242KB
-
MD5
a66c5b61ee043aa0b1cb3022cdee9658
-
SHA1
01795f351b8179d956711749832c53d17e90aee7
-
SHA256
108b8215bfc3a88cf529046b592858d0f80810e76a48b3090d57a73acd3f04f5
-
SHA512
b58ff2973f489f8aacffe35b29666e36c0d1eb034bc8ac44077d00a504741db4b3ee03e0ca3e0b99df2b910b8cbdf229c6afcc0e5c0e188278d04c08e0fd5532
-
SSDEEP
3072:wWC+dVggq929V3A/zwsWPAwyPa5KQJVvZkShn5cp5XzTLLm:wJIdqQXmzYAwyPaocRkSQpVTO
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
5050
C2
31.41.44.28
146.19.233.250
46.8.19.158
Attributes
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain
Signatures
Processes
-
C:\Users\Admin\AppData\Local\Temp\108b8215bfc3a88cf529046b592858d0f80810e76a48b3090d57a73acd3f04f5_JC.exe"C:\Users\Admin\AppData\Local\Temp\108b8215bfc3a88cf529046b592858d0f80810e76a48b3090d57a73acd3f04f5_JC.exe"1⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 5042⤵
- Program crash
PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3004 -ip 30041⤵PID:1444