MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 27b3c804921ba560e04fcff33f185c76b08bf4473fa7f1bb699645e6da86c52e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 27b3c804921ba560e04fcff33f185c76b08bf4473fa7f1bb699645e6da86c52e
SHA3-384 hash: b0dc8564ea612e3736ce5e126ea8de9ae7cde8d641ae37de8937abf8a558a44ab17350e9a7202f5fb52ab1b0b4cf176d
SHA1 hash: e7edd6d21740057c73747fb13565a9d61bae7778
MD5 hash: b497e4bc216dd2f311c49ff08d546637
humanhash: berlin-north-harry-venus
File name:skp.dll
Download: download sample
Signature Gozi
File size:721'408 bytes
First seen:2020-05-29 07:04:55 UTC
Last seen:2020-05-29 08:06:22 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash c50d9bea08639b9176aabe1a254bcf6b (3 x Gozi)
ssdeep 12288:CoYYiLPRW/httePP2JG9rPoC9JoOn7cGOAPG/MzTWD8jZSmA6p0FqvPWR1:MV9wReYGXn4kO/MzK4jZpA7qa
Threatray 27 similar samples on MalwareBazaar
TLSH 86E4CF363A9195BAE10F0A7E5C13C4B48AB17C58933144DB36C18E6B173B68B8DE4F97
Reporter abuse_ch
Tags:dll geo Gozi POL ZLoader


Avatar
abuse_ch
Malspam distributing ZLoader:

HELO: cloudserver071398.home.pl
Sending IP: 79.96.81.24
From: Orange <komfort@kancelaria-broker.pl>
Reply-To: Orange <biuro@kalisz-ubezpieczenia.pl>
Subject: e-faktura 05.2020
Attachment: faktura_59.xlsm

ZLoader payload URL:
https://aonagenarian.eu/3/skp.dll

ZLoader C2:
https://militanttra.at/owg.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
89
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-29 07:21:59 UTC
File Type:
PE (Dll)
AV detection:
21 of 30 (70.00%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader botnet:bot5 campaign:bot5 botnet trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://militanttra.at/owg.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Gozi

DLL dll 27b3c804921ba560e04fcff33f185c76b08bf4473fa7f1bb699645e6da86c52e

(this sample)

  
Delivery method
Distributed via web download

Comments