General
-
Target
26dc3b58f57bf1d28e20374fcc13c33f3bc75bd753cf19afb617101f403f7b81_JC.exe
-
Size
287KB
-
Sample
230929-rs973adb24
-
MD5
bbf59fbbb9de660e113d82597c289cff
-
SHA1
85e3f40d8e5e5b93ef0e45e3cb5eec9dd19685be
-
SHA256
26dc3b58f57bf1d28e20374fcc13c33f3bc75bd753cf19afb617101f403f7b81
-
SHA512
8310447870f5de4ae575306391295f205d8ec0e3295f30e8b79e6d65a4e85ad408b0d07859e1c30294c843e5d23ca324d24fb20fe9ddb299dc4ad47d6a24cbfa
-
SSDEEP
3072:j6ya4jStntwsx48m71HMmJn0iZw6vK1ZRQxAgaX6wwrz+UTaBgfUd0:Q4gtTm7+mJnNZfK1ZRHRoJ
Static task
static1
Behavioral task
behavioral1
Sample
26dc3b58f57bf1d28e20374fcc13c33f3bc75bd753cf19afb617101f403f7b81_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
gozi
Extracted
gozi
5050
netsecurez.com
whofoxy.com
mimemoa.com
ntcgo.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
31.41.44.79
185.248.144.203
netsecurez.com
whofoxy.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Targets
-
-
Target
26dc3b58f57bf1d28e20374fcc13c33f3bc75bd753cf19afb617101f403f7b81_JC.exe
-
Size
287KB
-
MD5
bbf59fbbb9de660e113d82597c289cff
-
SHA1
85e3f40d8e5e5b93ef0e45e3cb5eec9dd19685be
-
SHA256
26dc3b58f57bf1d28e20374fcc13c33f3bc75bd753cf19afb617101f403f7b81
-
SHA512
8310447870f5de4ae575306391295f205d8ec0e3295f30e8b79e6d65a4e85ad408b0d07859e1c30294c843e5d23ca324d24fb20fe9ddb299dc4ad47d6a24cbfa
-
SSDEEP
3072:j6ya4jStntwsx48m71HMmJn0iZw6vK1ZRQxAgaX6wwrz+UTaBgfUd0:Q4gtTm7+mJnNZfK1ZRHRoJ
-
Dave packer
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-