MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 00f830a0748680a63981f427ece7c3f4a989d97431dc1f4e78706eb8987a8286. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: 00f830a0748680a63981f427ece7c3f4a989d97431dc1f4e78706eb8987a8286
SHA3-384 hash: 22a2f415a9a7c68999ff301a30c8638096e2c163f879a38c277ce638da7815d88600d3883306fef31ff30a41c9f84ee9
SHA1 hash: 1489f26ecd643a8bd446bf12f34ed12ff52f657d
MD5 hash: 4d297821ee0045908fb60e50dfbed6bc
humanhash: romeo-grey-delaware-east
File name:629f0b8763fbe.dll
Download: download sample
Signature Gozi
File size:520'192 bytes
First seen:2022-06-07 08:26:23 UTC
Last seen:2022-06-07 08:37:28 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash bb571df3a57a3698febcd33b778809fc (2 x Gozi)
ssdeep 6144:cU/d8NlCDGWbLmIqsNVpQp37kroUFGkTW1yXJ7CgPxLWzduornEabuFGGGGGGGGf:coIlCKVIqsZYrkrN7WiflSduknL
Threatray 7'001 similar samples on MalwareBazaar
TLSH T101B49D923B39CB6ED97E0A39E346E61F85DB92A5C270A05FE1308D5773160A2237D353
TrID 45.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.3% (.EXE) OS/2 Executable (generic) (2029/13)
18.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.0% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 4a696ddce4f4f261 (26 x Gozi, 9 x AgentTesla, 3 x FFDroider)
Reporter JAMESWT_WT
Tags:DHL dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
765
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Disables SPDY (HTTP compression, likely to perform web injects)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes registry values via WMI
Writes to foreign memory regions
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 640437 Sample: 629f0b8763fbe.dll Startdate: 07/06/2022 Architecture: WINDOWS Score: 100 69 Snort IDS alert for network traffic 2->69 71 Malicious sample detected (through community Yara rule) 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 2 other signatures 2->75 11 loaddll32.exe 1 2->11         started        13 mshta.exe 19 2->13         started        process3 process4 15 cmd.exe 1 11->15         started        17 WerFault.exe 2 9 11->17         started        20 WerFault.exe 3 9 11->20         started        22 WerFault.exe 3 9 11->22         started        24 powershell.exe 33 13->24         started        dnsIp5 27 rundll32.exe 1 6 15->27         started        65 192.168.2.1 unknown unknown 17->65 89 Injects code into the Windows Explorer (explorer.exe) 24->89 91 Writes to foreign memory regions 24->91 93 Modifies the context of a thread in another process (thread injection) 24->93 95 2 other signatures 24->95 31 csc.exe 3 24->31         started        34 csc.exe 24->34         started        36 conhost.exe 24->36         started        signatures6 process7 dnsIp8 67 37.10.71.221, 49778, 80 M247GB Germany 27->67 97 System process connects to network (likely due to code injection or exploit) 27->97 99 Writes to foreign memory regions 27->99 101 Modifies the context of a thread in another process (thread injection) 27->101 103 2 other signatures 27->103 38 control.exe 27->38         started        61 C:\Users\user\AppData\Local\...\2breo2rp.dll, PE32 31->61 dropped 41 cvtres.exe 1 31->41         started        63 C:\Users\user\AppData\Local\...\klymxbcl.dll, PE32 34->63 dropped 43 cvtres.exe 34->43         started        file9 signatures10 process11 signatures12 81 Changes memory attributes in foreign processes to executable or writable 38->81 83 Injects code into the Windows Explorer (explorer.exe) 38->83 85 Writes to foreign memory regions 38->85 87 4 other signatures 38->87 45 explorer.exe 38->45 injected 48 rundll32.exe 38->48         started        process13 signatures14 105 Tries to steal Mail credentials (via file / registry access) 45->105 107 Changes memory attributes in foreign processes to executable or writable 45->107 109 Self deletion via cmd or bat file 45->109 111 6 other signatures 45->111 50 cmd.exe 45->50         started        53 RuntimeBroker.exe 45->53 injected 55 cmd.exe 45->55         started        process15 signatures16 77 Uses ping.exe to sleep 50->77 79 Uses ping.exe to check the status of other devices and networks 50->79 57 conhost.exe 50->57         started        59 PING.EXE 50->59         started        process17
Threat name:
Win32.Infostealer.Gozi
Status:
Malicious
First seen:
2022-06-07 08:27:08 UTC
File Type:
PE (Dll)
Extracted files:
11
AV detection:
24 of 41 (58.54%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:3000 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
config.edge.skype.com
37.10.71.221
45.11.180.10
Unpacked files
SH256 hash:
32d822ea504b887d1a74111d495cccad05b5a02191d2a88697466a157f072c2b
MD5 hash:
22440204af6038798427729f90f0de1d
SHA1 hash:
4a9fe542a2da999db368634e7b9aebeead189056
Detections:
win_isfb_auto
SH256 hash:
754b89a4abba25b33c47c46634d92dc9d37f86a93bfbba07d109b08072ebabea
MD5 hash:
e16377957bfaea6c3b6bf37fda360d7b
SHA1 hash:
b10015b49d1ac9ffbfd76cb63c461dfb9867fda8
SH256 hash:
00f830a0748680a63981f427ece7c3f4a989d97431dc1f4e78706eb8987a8286
MD5 hash:
4d297821ee0045908fb60e50dfbed6bc
SHA1 hash:
1489f26ecd643a8bd446bf12f34ed12ff52f657d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments