General
-
Target
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6_JC.exe
-
Size
181KB
-
Sample
230929-r5kg6sdd26
-
MD5
e54d9f8d9757fe6eead98ab59bd59ffa
-
SHA1
60c8766682b968d9367f9099378f2c9f0ed07278
-
SHA256
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6
-
SHA512
b362675e7c21b0336ed5844ed453334bd93257ea6901fed5b532d06db54ad775c33c17c753414f34c8c9117ce38cc072a4b59deeb7add1ea76b63183948f511e
-
SSDEEP
3072:+gZW8+P3NtOTH8CG95Ja4tXybaVLbPkxAgaX6wwzCqIg9:+SWfPLOL85hlVfjRSIg9
Static task
static1
Behavioral task
behavioral1
Sample
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
gozi
Extracted
gozi
5050
netsecurez.com
whofoxy.com
mimemoa.com
ntcgo.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
31.41.44.79
185.248.144.203
netsecurez.com
whofoxy.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Targets
-
-
Target
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6_JC.exe
-
Size
181KB
-
MD5
e54d9f8d9757fe6eead98ab59bd59ffa
-
SHA1
60c8766682b968d9367f9099378f2c9f0ed07278
-
SHA256
64eee9187e295afcb6989200de6fef6ca563d48881784c38765e5cc590e55ad6
-
SHA512
b362675e7c21b0336ed5844ed453334bd93257ea6901fed5b532d06db54ad775c33c17c753414f34c8c9117ce38cc072a4b59deeb7add1ea76b63183948f511e
-
SSDEEP
3072:+gZW8+P3NtOTH8CG95Ja4tXybaVLbPkxAgaX6wwzCqIg9:+SWfPLOL85hlVfjRSIg9
-
Dave packer
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-