Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 18:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
melange.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
melange.dll
-
Size
680KB
-
MD5
e64f11baf4702c7e8c48665e22fab125
-
SHA1
4e5adc8e8e980f3ddc40edbeb6af2d39545d6f05
-
SHA256
851cc6fec3ef98671e93301e4e7f0c23458464396d9f8dce7fc4e89802f48ad8
-
SHA512
88c6294e5254916fa0c93dcd129172978276804db3cde4cb9f757a0c75352373587e33abbb7cb99f6c76b425c1fb325819fa80d9ace138efa5ec8b7f701938c2
-
SSDEEP
12288:TOgVktK4arTQrNn4Gq0hS7M+M8uFKLrseaCoZSSi7Pq6b4bi:agWtja/QrNn4GqJY8v3sen1Dq3bi
Malware Config
Extracted
Family
gozi
Extracted
Family
gozi
Botnet
2500
C2
gtr.antoinfer.com
app.bighomegl.at
Attributes
-
build
250211
-
exe_type
loader
-
server_id
580
rsa_pubkey.plain
aes.plain
Signatures
-
Gozi family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2872 2984 rundll32.exe 83 PID 2984 wrote to memory of 2872 2984 rundll32.exe 83 PID 2984 wrote to memory of 2872 2984 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\melange.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\melange.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2872
-