General
-
Target
5ae2bfbcb10f2e75dca7623a8a498e7b54f457c6bc1f446dd323007757ca5759
-
Size
626KB
-
Sample
241221-v7k39svkds
-
MD5
ec4e4a12ec967c59f1f8db69aae98d85
-
SHA1
447ef4a42a0cb3551eee17c13f288df50df5ac08
-
SHA256
5ae2bfbcb10f2e75dca7623a8a498e7b54f457c6bc1f446dd323007757ca5759
-
SHA512
168fcab8799e20f6a12f5a0e5f614f2a30d96a14d415c78c78cc53c8decd8de85f71e368e55686e0ed2acc906b1969c44aaea4044eb79e654f1cc3ec60498417
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zb:+w1lEKOpuYxiwkkgjAN8Zb
Static task
static1
Behavioral task
behavioral1
Sample
5ae2bfbcb10f2e75dca7623a8a498e7b54f457c6bc1f446dd323007757ca5759.dll
Resource
win7-20240729-en
Malware Config
Extracted
gozi
Extracted
gozi
999
config.edge.skype.com
146.70.35.138
146.70.35.142
-
base_path
/phpadmin/
-
build
250227
-
exe_type
loader
-
extension
.src
-
server_id
50
Targets
-
-
Target
5ae2bfbcb10f2e75dca7623a8a498e7b54f457c6bc1f446dd323007757ca5759
-
Size
626KB
-
MD5
ec4e4a12ec967c59f1f8db69aae98d85
-
SHA1
447ef4a42a0cb3551eee17c13f288df50df5ac08
-
SHA256
5ae2bfbcb10f2e75dca7623a8a498e7b54f457c6bc1f446dd323007757ca5759
-
SHA512
168fcab8799e20f6a12f5a0e5f614f2a30d96a14d415c78c78cc53c8decd8de85f71e368e55686e0ed2acc906b1969c44aaea4044eb79e654f1cc3ec60498417
-
SSDEEP
12288:+w1lEKREbddtOYRbHzcPwka1dCjc3N8Zb:+w1lEKOpuYxiwkkgjAN8Zb
-
Gozi family
-
Blocklisted process makes network request
-