General
-
Target
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
-
Size
937KB
-
Sample
241221-v24cnatrg1
-
MD5
9a8457b3a9c9d71e11ab219de1c8d503
-
SHA1
04a43d7bbb61082d832be616de6728b54619a26d
-
SHA256
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
-
SHA512
572bf667f4b611d74e43965295f316bf11e7bbe955f572a6105055d7dc88456ac78c3924b7410b5507f77eb9a30283622a45d719a8cacfa41a83477f6de34d63
-
SSDEEP
24576:HQfpzjXPgft8CJV4X+IBIJ3cazaLwj1mCG9CpNiLi:IFDgBJV4OaIRj150CpNiLi
Static task
static1
Behavioral task
behavioral1
Sample
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4.dll
Resource
win7-20240903-en
Malware Config
Extracted
gozi
Extracted
gozi
4500
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
-
build
250188
-
exe_type
loader
-
server_id
580
Targets
-
-
Target
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
-
Size
937KB
-
MD5
9a8457b3a9c9d71e11ab219de1c8d503
-
SHA1
04a43d7bbb61082d832be616de6728b54619a26d
-
SHA256
e1ad3fe6d1a7efa2dd27f32d78abf43f6adb0d27e00044168db258d95e1ef4d4
-
SHA512
572bf667f4b611d74e43965295f316bf11e7bbe955f572a6105055d7dc88456ac78c3924b7410b5507f77eb9a30283622a45d719a8cacfa41a83477f6de34d63
-
SSDEEP
24576:HQfpzjXPgft8CJV4X+IBIJ3cazaLwj1mCG9CpNiLi:IFDgBJV4OaIRj150CpNiLi
-
Gozi family
-