MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16e5ddfcf4902431e2566a2a04424e1b0236d2958647bd57b7075be0013c3de1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 16e5ddfcf4902431e2566a2a04424e1b0236d2958647bd57b7075be0013c3de1
SHA3-384 hash: d30bd71d86e527ccc4224c2e7c983e207ffdcde3282e481c9fc84c59631df2dce792c7aed866a62abd3e7cae026ad60f
SHA1 hash: e04b18bbc023bd32df83166046b79c26287b57dc
MD5 hash: 58235615794a661013ea23da827faaac
humanhash: oklahoma-uniform-hamper-vegan
File name:SecuriteInfo.com.Trojan.Dridex.704.8586.7501
Download: download sample
Signature Gozi
File size:662'528 bytes
First seen:2020-06-02 21:30:57 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 9b6633e85c68c0277bf2da68b640f509 (15 x Gozi, 2 x ZLoader)
ssdeep 12288:yFyxomntU5cu7cGDD+pJ7ZwwF3E+pgkbRzFyWBaobi/jDnQAVVR/VUR:yFyxomntU5dapcuxpgaHmPjVR/VU
Threatray 69 similar samples on MalwareBazaar
TLSH CDE4BE05B791D038F9B726F98EBEA1B8943D7DA05B2494CB23C41AEF55246F1AC30727
Reporter SecuriteInfoCom
Tags:Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-02 21:35:28 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
18 of 31 (58.06%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader botnet:bot5 campaign:bot5 botnet trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://militanttra.at/owg.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments