MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8e0238b207985132e60e6f5bc764a6756bce554f9c27b922f1d7e40950a3bbdc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 8e0238b207985132e60e6f5bc764a6756bce554f9c27b922f1d7e40950a3bbdc
SHA3-384 hash: f60afc837623c1f634a444e81442bdc0a4c8bb56bfbbc803de979f0810fd412e4f536bfd74e2e619b0cc7305ec49b184
SHA1 hash: 1f0a20e767a24c521e9dc8312ea1f9938f7423d6
MD5 hash: 9c4963a4115b80784d2f0cdf7a74255b
humanhash: wyoming-paris-november-hotel
File name:rogyx.dll
Download: download sample
Signature Gozi
File size:662'528 bytes
First seen:2020-06-02 21:52:38 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 9b6633e85c68c0277bf2da68b640f509 (15 x Gozi, 2 x ZLoader)
ssdeep 12288:yFyxomntU5cu7cGDD+pJ7ZwwF3E+pgMbRzFyWBaobi/jDnQAVVR/VUR:yFyxomntU5dapcuxpgiHmPjVR/VU
Threatray 69 similar samples on MalwareBazaar
TLSH 05E4BE05B791D038F9B726F98EBEA1B8943D7DA05B2494CB23C41AEF55246F1AC30727
Reporter malware_traffic
Tags:dll Gozi ZLoader


Avatar
malware_traffic
ZLoader DLL --> rundll32.exe rogyx.dll,DllRegisterServer

Intelligence


File Origin
# of uploads :
1
# of downloads :
76
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-06-02 22:35:42 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
19 of 31 (61.29%)
Threat level:
  2/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader botnet:bot5 campaign:bot5 botnet trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://militanttra.at/owg.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments