MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d2e11c37f1d10e4dfd3f525ee70c5c9f157996b927d94e2c355a4107dbb617c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 8d2e11c37f1d10e4dfd3f525ee70c5c9f157996b927d94e2c355a4107dbb617c
SHA3-384 hash: d2dd9f1a0a3d07946f0094a9dcfe3798da496535dc1849f70b25c9f6bc465b544b80119d3c6d0bf8a174369d9342f59d
SHA1 hash: 9f27009de9b209e236c9f17992e4c2f5b3804d28
MD5 hash: 88f1f262f2a14c645e55862ddca65815
humanhash: uniform-foxtrot-sodium-wolfram
File name:installa.dll
Download: download sample
Signature Gozi
File size:119'296 bytes
First seen:2020-10-20 04:52:45 UTC
Last seen:2020-10-25 18:07:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2dc63e88aeb15731c361449e523bd027 (1 x Gozi)
ssdeep 1536:4sGkhUammObUAfaptRgYGRU7nXdW223hd8udvJ+EWlZOIW15fj/02xlINc66Ms3+:Lm8tRDGYnN3Ghq2J+EW6jfXPHM6pY
Threatray 39 similar samples on MalwareBazaar
TLSH BCC37CB6D3F52FB3D467237D59FA60B00BB1DD5B0B0BA826A74322612F917C5A984C31
Reporter JAMESWT_WT
Tags:dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
299
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Searching for the window
Result
Threat name:
Detection:
malicious
Classification:
bank.troj
Score:
84 / 100
Signature
Creates a COM Internet Explorer object
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 300620 Sample: installa.dll Startdate: 20/10/2020 Architecture: WINDOWS Score: 84 34 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected  Ursnif 2->38 40 2 other signatures 2->40 8 loaddll32.exe 1 2->8         started        process3 process4 10 regsvr32.exe 8->10         started        13 cmd.exe 1 8->13         started        signatures5 42 Writes or reads registry keys via WMI 10->42 44 Writes registry values via WMI 10->44 46 Creates a COM Internet Explorer object 10->46 15 iexplore.exe 2 78 13->15         started        process6 process7 17 iexplore.exe 5 95 15->17         started        20 iexplore.exe 29 15->20         started        22 iexplore.exe 30 15->22         started        24 3 other processes 15->24 dnsIp8 26 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49754, 49755 FASTLYUS United States 17->26 28 www.msn.com 17->28 32 8 other IPs or domains 17->32 30 windowclient.com 45.140.168.107, 49773, 49774, 49775 ASBAXETRU Russian Federation 20->30
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2020-10-20 04:54:05 UTC
File Type:
PE (Dll)
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
banker trojan family:gozi_ifsb
Behaviour
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Blacklisted process makes network request
Gozi, Gozi IFSB
Unpacked files
SH256 hash:
8d2e11c37f1d10e4dfd3f525ee70c5c9f157996b927d94e2c355a4107dbb617c
MD5 hash:
88f1f262f2a14c645e55862ddca65815
SHA1 hash:
9f27009de9b209e236c9f17992e4c2f5b3804d28
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

Executable exe 8d2e11c37f1d10e4dfd3f525ee70c5c9f157996b927d94e2c355a4107dbb617c

(this sample)

Comments