General
-
Target
57d3eb665f1e9e6a19f278baabd49e7b.bin
-
Size
9KB
-
Sample
231007-bz6v8agg3v
-
MD5
7757438e6f7cca0a4bb164801d88b3b3
-
SHA1
7fab6b5c30d33f3d5ec4d65712c65c53943ed1e5
-
SHA256
c148a90c12cc2c6664e074799c4a19ad28bdd2c47e3f0bf7c553dbecf89bf8fc
-
SHA512
7de0044b7140dbb5f3cd3daf11d046bf3809ca61ad520a0404cf4c41283ffcca9639d98d305aff9e05c22624b306837ae799bbff728c10672b231cee75009aa8
-
SSDEEP
192:Xk+GmCAiZHZUfMIenLHxYm4VhVwDF5jBokc4Rjiq2m2YgofO0IqGwV3J:XlGvUfMlLRZ4VhVwZ5jBEWjtwqv
Static task
static1
Behavioral task
behavioral1
Sample
4380de3cba18880ef72d2bc73ec84ee6f9f27b55d635a81ab8d40d488f59303d.hta
Resource
win7-20230831-en
Malware Config
Extracted
http://communicalink.com/index.php
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
http://igrovdow.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Targets
-
-
Target
4380de3cba18880ef72d2bc73ec84ee6f9f27b55d635a81ab8d40d488f59303d.hta
-
Size
22KB
-
MD5
57d3eb665f1e9e6a19f278baabd49e7b
-
SHA1
44566a9d716e6abd0304544dd88d245fea990882
-
SHA256
4380de3cba18880ef72d2bc73ec84ee6f9f27b55d635a81ab8d40d488f59303d
-
SHA512
30a0a3349aa0b815728abdb0c770d65354cdcf68ca939de4c175bdb285e3d664d7afdddc4be91bae170a65e4f808e6de7cc877fa36442f64f7b7db993e83851d
-
SSDEEP
384:rO6BO5aa8mOFhyS1q5H8qxAt4VFhmqmfW9PW6vN1v35Zh5LaBY5E6bqBdOfF:4zS0kPWVN5LbtcOfF
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-