General
-
Target
80fdf93966123b8f52dc782635ed6cac
-
Size
484KB
-
Sample
240129-14v2ysdeaq
-
MD5
80fdf93966123b8f52dc782635ed6cac
-
SHA1
229d70fa81053040d2a6bbfcde62c4234c41d388
-
SHA256
59b7f1108a1a99ea8897952a5701e3cc771d7aa4adb0e6032a70c652eb2c0bd2
-
SHA512
a3a0257e846d581e9f5475a07329ef775c833f0be0ef9f87b20ba601a9dc08b625908f6ec2bc7871fcda8476f51df607d11227e4167db2acc154233c7cc8aec8
-
SSDEEP
12288:+Pa04+mliw+mpwfN4wZtshcgSN3SJpzQvpuvde5:YQ4wlKtwUSJ2vH
Static task
static1
Behavioral task
behavioral1
Sample
80fdf93966123b8f52dc782635ed6cac.dll
Resource
win7-20231129-en
Malware Config
Extracted
gozi
Extracted
gozi
8877
outlook.com
zaluoa.live
daskdjknefjkewfnkjwe.net
-
base_path
/jkloop/
-
build
250207
-
dga_season
10
-
exe_type
loader
-
extension
.kre
-
server_id
12
Targets
-
-
Target
80fdf93966123b8f52dc782635ed6cac
-
Size
484KB
-
MD5
80fdf93966123b8f52dc782635ed6cac
-
SHA1
229d70fa81053040d2a6bbfcde62c4234c41d388
-
SHA256
59b7f1108a1a99ea8897952a5701e3cc771d7aa4adb0e6032a70c652eb2c0bd2
-
SHA512
a3a0257e846d581e9f5475a07329ef775c833f0be0ef9f87b20ba601a9dc08b625908f6ec2bc7871fcda8476f51df607d11227e4167db2acc154233c7cc8aec8
-
SSDEEP
12288:+Pa04+mliw+mpwfN4wZtshcgSN3SJpzQvpuvde5:YQ4wlKtwUSJ2vH
-