Behavioral task
behavioral1
Sample
357b7106443d70fdcc1bf936483f6ff8121f9252b70522cf025adc48fd32c39dN.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
357b7106443d70fdcc1bf936483f6ff8121f9252b70522cf025adc48fd32c39dN.dll
Resource
win10v2004-20241007-en
General
-
Target
357b7106443d70fdcc1bf936483f6ff8121f9252b70522cf025adc48fd32c39dN.exe
-
Size
43KB
-
MD5
5a3171da44b454024c4fff2dec437600
-
SHA1
da4c8f4deacfaf1f2f1126b979f5c07a2756e3e6
-
SHA256
357b7106443d70fdcc1bf936483f6ff8121f9252b70522cf025adc48fd32c39d
-
SHA512
11242883a8c8bc2e2f23cb5efb39a202640989e062e8185f9ca8aef501afb631d4b6e67f8820f8778f172e314c960c8b80ec8e33cc019fb00d6843392e0b988e
-
SSDEEP
768:5l+1igrhFtX0iSyKSG6ZKpnn9oIyxiEitCfJffbpHANSF9Ooc/1d4coqZ:eigBX0ipf1KR9o1xiEitCfDHAsF9M/AQ
Malware Config
Extracted
gozi
1001
https://checklist.skype.com
http://176.10.125.84
http://91.242.219.235
http://79.132.130.73
http://176.10.119.209
http://194.76.225.88
http://79.132.134.158
-
base_path
/microsoft/
-
build
250256
-
exe_type
loader
-
extension
.acx
-
server_id
50
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 357b7106443d70fdcc1bf936483f6ff8121f9252b70522cf025adc48fd32c39dN.exe
Files
-
357b7106443d70fdcc1bf936483f6ff8121f9252b70522cf025adc48fd32c39dN.exe.dll windows:5 windows x86 arch:x86
656c3046678fbbd6d5aae78a8e8b8b47
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
memset
sprintf
strcpy
_snwprintf
ZwQueryInformationToken
wcstombs
ZwOpenProcess
ZwClose
ZwOpenProcessToken
mbstowcs
memcpy
_snprintf
_aulldiv
_allmul
_aullrem
RtlUnwind
NtQueryVirtualMemory
kernel32
RaiseException
InterlockedExchange
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
SetEvent
SleepEx
GetTickCount
GetCurrentThread
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
GetLastError
QueueUserAPC
lstrlenA
SetWaitableTimer
Process32First
WaitForSingleObject
Sleep
CreateEventA
lstrlenW
GetProcAddress
Process32Next
WaitForMultipleObjects
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
CreateWaitableTimerA
lstrcpyA
QueryPerformanceFrequency
LocalAlloc
lstrcmpW
GetVersionExA
LoadLibraryA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
ExpandEnvironmentStringsW
GetComputerNameExA
WideCharToMultiByte
GetComputerNameW
QueryPerformanceCounter
lstrcatA
GetCurrentProcessId
OpenProcess
GetVersion
ExpandEnvironmentStringsA
oleaut32
SysFreeString
SafeArrayDestroy
SafeArrayCreate
SysAllocString
winhttp
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpSetOption
WinHttpOpen
WinHttpOpenRequest
WinHttpReadData
WinHttpSendRequest
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ