General
-
Target
dokument9055.vbs
-
Size
1.6MB
-
Sample
231024-ql7mxsdb4y
-
MD5
bd22583a3b419a9acb7db67008e77a3c
-
SHA1
eed1bcd586d3b830fdd27d5cf76927db629bf1c0
-
SHA256
98b3160c553c229cb9be77de3791398aed3cce79e7935d96db9e32bf353b9624
-
SHA512
20a1b73be43366be9d58786ecc94025cb6ec4944c6d72c830cfebb37d9dc0de48841020dca3aff4d021de03fb557ef7b1be044b99101529e7a46f1e5ed60c0d2
-
SSDEEP
24576:pv52a7mOdpmQZ4b89zDO27CN1EqR/8mRlwRlHXufAkj9UNgEBSx53q:pv52umQz627KEcIN2Ac90BI53q
Static task
static1
Behavioral task
behavioral1
Sample
dokument9055.vbs
Resource
win7-20231023-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://news-deck.at
http://taslks.at
http://living-start.at
http://ali-express1.at
-
build
217107
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
dokument9055.vbs
-
Size
1.6MB
-
MD5
bd22583a3b419a9acb7db67008e77a3c
-
SHA1
eed1bcd586d3b830fdd27d5cf76927db629bf1c0
-
SHA256
98b3160c553c229cb9be77de3791398aed3cce79e7935d96db9e32bf353b9624
-
SHA512
20a1b73be43366be9d58786ecc94025cb6ec4944c6d72c830cfebb37d9dc0de48841020dca3aff4d021de03fb557ef7b1be044b99101529e7a46f1e5ed60c0d2
-
SSDEEP
24576:pv52a7mOdpmQZ4b89zDO27CN1EqR/8mRlwRlHXufAkj9UNgEBSx53q:pv52umQz627KEcIN2Ac90BI53q
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-