General
-
Target
210adf81fe8f17f79043a4f4fb4a4295
-
Size
484KB
-
Sample
231231-adjywsahdj
-
MD5
210adf81fe8f17f79043a4f4fb4a4295
-
SHA1
28833bc6a60add47a7312626d196a7ad8bfa9570
-
SHA256
d6be92449addfade8516a80f79fa2412f5e56dc6fb0c594903a6be6a696cea22
-
SHA512
396b2f60d94782ef37acfa499daefc1562cfe7fd80f6f3be183a81e9756cd906a38f3ee9f5a5469e890932de33e95c686e5fed6c69130db6214200b5ee492de9
-
SSDEEP
12288:DPa04+mliwWmpwf14wZtshcgSN3SJpzQvpuvdT5:DQ4wNytwUSJ2vG
Static task
static1
Behavioral task
behavioral1
Sample
210adf81fe8f17f79043a4f4fb4a4295.dll
Resource
win7-20231215-en
Malware Config
Extracted
gozi
Extracted
gozi
8877
outlook.com
zaluoa.live
daskdjknefjkewfnkjwe.net
-
base_path
/jkloop/
-
build
250207
-
dga_season
10
-
exe_type
loader
-
extension
.kre
-
server_id
12
Targets
-
-
Target
210adf81fe8f17f79043a4f4fb4a4295
-
Size
484KB
-
MD5
210adf81fe8f17f79043a4f4fb4a4295
-
SHA1
28833bc6a60add47a7312626d196a7ad8bfa9570
-
SHA256
d6be92449addfade8516a80f79fa2412f5e56dc6fb0c594903a6be6a696cea22
-
SHA512
396b2f60d94782ef37acfa499daefc1562cfe7fd80f6f3be183a81e9756cd906a38f3ee9f5a5469e890932de33e95c686e5fed6c69130db6214200b5ee492de9
-
SSDEEP
12288:DPa04+mliwWmpwf14wZtshcgSN3SJpzQvpuvdT5:DQ4wNytwUSJ2vG
-