General
-
Target
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.exe
-
Size
672KB
-
Sample
241111-aknwesxncx
-
MD5
727235afc25234c92c82e99c05a9f0c8
-
SHA1
a200141f482b8d470e0a3c1a7638a74df9987920
-
SHA256
732f00a1a664ca6b7a3b19a4f533a32719c7f1d688e3175e6e5118e7cd829693
-
SHA512
94eda3f5ad431382d51d98af49bb8672d79d7996b6beeb2e9ab7e036b6784a513ca1ebb2b3db35cb591ffd7a667c9605cb0948996bba30253f597955ad377db9
-
SSDEEP
12288:97EFH9MS0eApw2fmB1zNDLRfm4yVjg6AI18R5kQSuOscoujeNR:97EIeewHNIAIiRmQ9ujeNR
Static task
static1
Behavioral task
behavioral1
Sample
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.dll
Resource
win7-20241010-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://shoshanna.at
http://maiamirainy.at
-
build
217027
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
8860a9bed353619eaf28f28eea95f3cfdefbb6eb25f2a557966703cf74678de7N.exe
-
Size
672KB
-
MD5
727235afc25234c92c82e99c05a9f0c8
-
SHA1
a200141f482b8d470e0a3c1a7638a74df9987920
-
SHA256
732f00a1a664ca6b7a3b19a4f533a32719c7f1d688e3175e6e5118e7cd829693
-
SHA512
94eda3f5ad431382d51d98af49bb8672d79d7996b6beeb2e9ab7e036b6784a513ca1ebb2b3db35cb591ffd7a667c9605cb0948996bba30253f597955ad377db9
-
SSDEEP
12288:97EFH9MS0eApw2fmB1zNDLRfm4yVjg6AI18R5kQSuOscoujeNR:97EIeewHNIAIiRmQ9ujeNR
-
Gozi family
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-