General
-
Target
tster.exe
-
Size
11KB
-
Sample
240602-3f34rsba6x
-
MD5
feb6fd23d005b8d70446866b206042f8
-
SHA1
d7d01f6639e0f060e91a35949f9bf346aa0ea81a
-
SHA256
81f3c9ef76877647a56874054c58756d67e512ad55a0ab273dfa5e88dddd7c5c
-
SHA512
20f86fa77e079bd3794c32e793a9adb79ad7d847ca8d74591321153330dfa9aa15d11279b45a9497fec910b58533cdeedc293858fa29d20ffb80f96d519c70da
-
SSDEEP
192:52R8JP/PCS+plrpcV5K9+JPiukknPfhTx0ujmN+LKyOLi:58Q/a9plrpcVI9SKQfgutKyOL
Static task
static1
Behavioral task
behavioral1
Sample
tster.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
gozi
Targets
-
-
Target
tster.exe
-
Size
11KB
-
MD5
feb6fd23d005b8d70446866b206042f8
-
SHA1
d7d01f6639e0f060e91a35949f9bf346aa0ea81a
-
SHA256
81f3c9ef76877647a56874054c58756d67e512ad55a0ab273dfa5e88dddd7c5c
-
SHA512
20f86fa77e079bd3794c32e793a9adb79ad7d847ca8d74591321153330dfa9aa15d11279b45a9497fec910b58533cdeedc293858fa29d20ffb80f96d519c70da
-
SSDEEP
192:52R8JP/PCS+plrpcV5K9+JPiukknPfhTx0ujmN+LKyOLi:58Q/a9plrpcVI9SKQfgutKyOL
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-