MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6e079394b3a3085d572975115b334d813a79cd5833509b6afa45542687a5dfce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 3


Intelligence 3 IOCs YARA File information Comments

SHA256 hash: 6e079394b3a3085d572975115b334d813a79cd5833509b6afa45542687a5dfce
SHA3-384 hash: 0414063b754dac88f3afbe2ce99ca5989644333fec419e467bdf7dc1ab7c54ceeb09759b6115339773e131f10bf07fa2
SHA1 hash: dfea94b0acdd1c938e83bbd341921212e4d199aa
MD5 hash: ceb017d1700400db403b50a35e8a1738
humanhash: comet-sad-fillet-zebra
File name:1403854AC9as0.exe
Download: download sample
Signature Gozi
File size:74'123 bytes
First seen:2020-04-02 05:52:31 UTC
Last seen:2020-04-02 06:44:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b99d0c89827bb0b116a152cbe64f9c7b (1 x Gozi)
ssdeep 1536:kZmWq6D7SGLQZug8iM/kNeNlgUc6D/0Xx0OJQVjInFdXkx:I+6DSCIeXZc6D/dVILc
Threatray 710 similar samples on MalwareBazaar
TLSH CC73AEBB78E58D70E70209F0D89CDC66D62B99A07A035A96336D91E03DE62C71178B4F
Reporter abuse_ch
Tags:exe Gozi

Code Signing Certificate

Organisation:UTN-USERFirst-Object
Issuer:AddTrust External CA Root
Algorithm:sha1WithRSAEncryption
Valid from:Jun 7 08:09:10 2005 GMT
Valid to:May 30 10:48:38 2020 GMT
Serial number: 421AF2940984191F520A4BC62426A74B
Intelligence: 307 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2CF1EC6AB594113BD538DF6D5C940E3319B424F8756D975888072C6AB558B771
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
COVID-19 themed malspam distributing Gozi, using compromised email accounts:

HELO: smtp69.iad3a.emailsrvr.com
Sending IP: 173.203.187.69
From: accounts@jkhopkins.com.au
Subject: covid-info - # 487698-487698
Attachment: heflri.schorkiof-487698.xls

Gozi payload delivery URL:
https://www.istitutobpascalweb.it/mynotescom/renoovohostinglilnuxadvanced.php

Gozi C2:
https://prlottonews.xyz/index.htm

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Gozi

Executable exe 6e079394b3a3085d572975115b334d813a79cd5833509b6afa45542687a5dfce

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
MULTIMEDIA_APICan Play MultimediaGDI32.dll::StretchDIBits
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA
WIN_BASE_USER_APIRetrieves Account InformationADVAPI32.dll::GetUserNameA
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegOpenKeyA
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::FindWindowW

Comments