Behavioral task
behavioral1
Sample
1232-2-0x0000000000EB0000-0x0000000000F0F000-memory.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1232-2-0x0000000000EB0000-0x0000000000F0F000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
1232-2-0x0000000000EB0000-0x0000000000F0F000-memory.dmp
-
Size
380KB
-
MD5
8f0aac967f95a3801db5b6b5cbce6444
-
SHA1
774155eb1c6c1de15778537c78783c4e9ca1eeec
-
SHA256
961fb55bf864e0f2d118f1ec2e9f2ee17fb91a9777fb4925441d6a5029f727bc
-
SHA512
e2b911bc8395fa0ac9f9eeaa979dedd3c351618b8ef2f0ce9b6eee3a722fa6c8a00f3e93fb711af26d6f4268f7c9f7a8ff4d34ab07cf45b5c3edb0a7e2d9c9f9
-
SSDEEP
6144:CzMx5bKD8l6hvbsQ8ke/TaHUMhn0RM6BfKuTtmaJeVI28PI4yg9o6:Cgu86TsQW/ninLgfKuTkkxI4yg9o
Malware Config
Extracted
gozi
-
build
214084
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1232-2-0x0000000000EB0000-0x0000000000F0F000-memory.dmp
Files
-
1232-2-0x0000000000EB0000-0x0000000000F0F000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 512B - Virtual size: 464B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ