MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a9b7021255f515544819e0d0d7fc650a7c2f373efbd6582761679f2ae6ce05cc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: a9b7021255f515544819e0d0d7fc650a7c2f373efbd6582761679f2ae6ce05cc
SHA3-384 hash: 6371afb1dd774caf72e57556161cb1f9caae0505208dc76c2585d397f36b477ae031050d030d9d154704aac7ed03c380
SHA1 hash: 2567a5689aa961855dcdbb979ecc140470e89577
MD5 hash: c359fa6fc497ab698a9639ddd183c6d2
humanhash: violet-charlie-arizona-gee
File name:SecuriteInfo.com.Trojan.Agent.ERUS.7646.2652
Download: download sample
Signature Gozi
File size:679'936 bytes
First seen:2020-06-05 12:43:26 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f9b9221f67b0fccc2e9a35bec3a33d30 (5 x Gozi, 3 x ZLoader)
ssdeep 12288:bHMY2akXvNE8jI0pNOG/yin1bb6H9UoyLRAq6BdnbbXO+uVBzSeiTzF:gy6NE88KwitR6H9xWRPYOBzqX
Threatray 120 similar samples on MalwareBazaar
TLSH 19E48D1277B04024F6BB1BB854FB11659A7E7ED09738C5CB43C022EA4AB7AD0AE34757
Reporter SecuriteInfoCom
Tags:Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Worm.Cridex
Status:
Malicious
First seen:
2020-06-05 13:22:59 UTC
AV detection:
23 of 31 (74.19%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader botnet:bot5 campaign:bot5 botnet persistence trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://militanttra.at/owg.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments