General
-
Target
084aaf4ed20aaf6d53a75ffa92a4d9f7
-
Size
543KB
-
Sample
231230-alwbwsffck
-
MD5
084aaf4ed20aaf6d53a75ffa92a4d9f7
-
SHA1
6a3fc820992f5a2ad96fd60eaa7caec4242669f6
-
SHA256
1c5545e8fe89c9d6a0171332305d2aa83d7eb343b62d6615308ba93b93b15272
-
SHA512
058aadaef1a54457d05f7013f182ac01553f7312b372e341a5108592eda879f3486108e613b15f4eb703c18df486b573e0206f2d4a8273d34034040e03a87966
-
SSDEEP
12288:KaMB5j1f/QOwOSnV8Eh3doxeNZNN2lFzx3ycxXs4:KaWz3E4INX03ycxc4
Static task
static1
Behavioral task
behavioral1
Sample
084aaf4ed20aaf6d53a75ffa92a4d9f7.dll
Resource
win7-20231215-en
Malware Config
Extracted
gozi
Extracted
gozi
8877
outlook.com
zaluoa.live
daskdjknefjkewfnkjwe.net
-
base_path
/jkloop/
-
build
250207
-
dga_season
10
-
exe_type
loader
-
extension
.kre
-
server_id
12
Targets
-
-
Target
084aaf4ed20aaf6d53a75ffa92a4d9f7
-
Size
543KB
-
MD5
084aaf4ed20aaf6d53a75ffa92a4d9f7
-
SHA1
6a3fc820992f5a2ad96fd60eaa7caec4242669f6
-
SHA256
1c5545e8fe89c9d6a0171332305d2aa83d7eb343b62d6615308ba93b93b15272
-
SHA512
058aadaef1a54457d05f7013f182ac01553f7312b372e341a5108592eda879f3486108e613b15f4eb703c18df486b573e0206f2d4a8273d34034040e03a87966
-
SSDEEP
12288:KaMB5j1f/QOwOSnV8Eh3doxeNZNN2lFzx3ycxXs4:KaWz3E4INX03ycxc4
-
Blocklisted process makes network request
-