Behavioral task
behavioral1
Sample
eb9ebd15db72965fbfb4883ba7eb441ee37999705399f57c6c15cd81ed35e308.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eb9ebd15db72965fbfb4883ba7eb441ee37999705399f57c6c15cd81ed35e308.dll
Resource
win10v2004-20241007-en
General
-
Target
eb9ebd15db72965fbfb4883ba7eb441ee37999705399f57c6c15cd81ed35e308.exe
-
Size
43KB
-
MD5
c4b5ae2277074ae930d21864b2214a02
-
SHA1
2c75dc36e4b58da3d3306b37a1f8986a88f05d96
-
SHA256
eb9ebd15db72965fbfb4883ba7eb441ee37999705399f57c6c15cd81ed35e308
-
SHA512
77b74f9b594d2b435d64154d1c50985abcecb0f57492753e3f1fdf2d6efd43d9b6e55268462da59a69b22894dc34d8ab7bfe46b201771900cd9e5cad2fcb02d6
-
SSDEEP
768:5l+1igrhFtX0iSyKSG6ZKpnn9oIyxiEitCfJffbpHANSF9Ooc/1d4coqZO:eigBX0ipf1KR9o1xiEitCfDHAsF9M/Af
Malware Config
Extracted
gozi
1001
https://checklist.skype.com
http://176.10.125.84
http://91.242.219.235
http://79.132.130.73
http://176.10.119.209
http://194.76.225.88
http://79.132.134.158
-
base_path
/microsoft/
-
build
250256
-
exe_type
loader
-
extension
.acx
-
server_id
50
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb9ebd15db72965fbfb4883ba7eb441ee37999705399f57c6c15cd81ed35e308.exe
Files
-
eb9ebd15db72965fbfb4883ba7eb441ee37999705399f57c6c15cd81ed35e308.exe.dll windows:5 windows x86 arch:x86
656c3046678fbbd6d5aae78a8e8b8b47
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
ntdll
memset
sprintf
strcpy
_snwprintf
ZwQueryInformationToken
wcstombs
ZwOpenProcess
ZwClose
ZwOpenProcessToken
mbstowcs
memcpy
_snprintf
_aulldiv
_allmul
_aullrem
RtlUnwind
NtQueryVirtualMemory
kernel32
RaiseException
InterlockedExchange
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
SetEvent
SleepEx
GetTickCount
GetCurrentThread
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
GetLastError
QueueUserAPC
lstrlenA
SetWaitableTimer
Process32First
WaitForSingleObject
Sleep
CreateEventA
lstrlenW
GetProcAddress
Process32Next
WaitForMultipleObjects
GetModuleHandleA
CreateToolhelp32Snapshot
CloseHandle
CreateWaitableTimerA
lstrcpyA
QueryPerformanceFrequency
LocalAlloc
lstrcmpW
GetVersionExA
LoadLibraryA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
ExpandEnvironmentStringsW
GetComputerNameExA
WideCharToMultiByte
GetComputerNameW
QueryPerformanceCounter
lstrcatA
GetCurrentProcessId
OpenProcess
GetVersion
ExpandEnvironmentStringsA
oleaut32
SysFreeString
SafeArrayDestroy
SafeArrayCreate
SysAllocString
winhttp
WinHttpQueryHeaders
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryDataAvailable
WinHttpReceiveResponse
WinHttpQueryOption
WinHttpSetOption
WinHttpOpen
WinHttpOpenRequest
WinHttpReadData
WinHttpSendRequest
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ