MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 01006cd1258047b9e2bd9f58b303bd22c39b7f3242db9e4111f88b9f78b9df8f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 01006cd1258047b9e2bd9f58b303bd22c39b7f3242db9e4111f88b9f78b9df8f
SHA3-384 hash: aea36fe4c389bf5f4218c63539cf355f66707676e45daf9f91c26552508dad8cd4612704b437529e592667a4fc06c289
SHA1 hash: edfacd4d94a56d5011445cd103c6b45ae9585adf
MD5 hash: ad4076a9b4f10e046059151b9e1c030a
humanhash: uniform-quiet-georgia-juliet
File name:0204.gif.dll
Download: download sample
Signature Gozi
File size:140'621 bytes
First seen:2021-04-06 07:55:59 UTC
Last seen:2021-04-06 07:56:00 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 3f728412058b62c418b1091768b74d7b (8 x Gozi)
ssdeep 1536:tm15JsYYm3GCVS7ZicTJzRVd620ZmB9RMli0msUdqZEACW4jySTLW:eLsacThRVd6pmBPM07vYZEA4/W
Threatray 215 similar samples on MalwareBazaar
TLSH 32D3BE0CF7E950C1C5DA3AB750B19E287228EE128DB4243616F62E797FF71A37C29485
Reporter JAMESWT_WT
Tags:dll GG Gozi ifsb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
306
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 382565 Sample: 0204.gif.dll Startdate: 06/04/2021 Architecture: WINDOWS Score: 68 15 Found malware configuration 2->15 17 Multi AV Scanner detection for submitted file 2->17 19 Yara detected  Ursnif 2->19 21 Machine Learning detection for sample 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        process5 13 rundll32.exe 9->13         started       
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-04-06 07:54:28 UTC
File Type:
PE (Dll)
AV detection:
21 of 48 (43.75%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments