MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 02bb7e5eda106943c37400103a651d11d1ebfd5f4b0a550874328c2c82340923. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Gozi
Vendor detections: 11
| SHA256 hash: | 02bb7e5eda106943c37400103a651d11d1ebfd5f4b0a550874328c2c82340923 |
|---|---|
| SHA3-384 hash: | 9dd61b9a271e27e3f86e9c09fb4041d2f484b61d4f81b558abc5f26e172414a3d72070f2674ff28d3a9eca47f95a754f |
| SHA1 hash: | 6e2d76945861c48a2e4552d87583c1a70e6525a2 |
| MD5 hash: | 947fe47db34a2654fc7aa76ec2bebec0 |
| humanhash: | lima-white-mars-lion |
| File name: | status.dll |
| Download: | download sample |
| Signature | Gozi |
| File size: | 1'235'456 bytes |
| First seen: | 2022-01-19 10:49:06 UTC |
| Last seen: | 2022-01-19 11:11:38 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7790023abe9e706b7ca9941ca04b698c (1 x Gozi) |
| ssdeep | 24576:a04Q1k7lRM3FymFIz5yfd/N04Q1k7lRM3FymFIz5yfd/N04Q1k7lRM3FymFIz5yE:fXu/MV/INrXu/MV/INrXu/MV/INN9Vz |
| Threatray | 345 similar samples on MalwareBazaar |
| TLSH | T12B45128AD3FD18A4F5F3ADB22D719983CC6B7D12A921A46D1B5A094E08744CCDEB1373 |
| Reporter | |
| Tags: | agenziaentrate exe Gozi italy Ursnif |
Intelligence
File Origin
# of uploads :
3
# of downloads :
444
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
947fe47db34a2654fc7aa76ec2bebec0.exe
Verdict:
Malicious activity
Analysis date:
2022-01-19 08:25:02 UTC
Tags:
trojan gozi ursnif dreambot
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Launching a process
Searching for synchronization primitives
Сreating synchronization primitives
Creating a window
Sending an HTTP GET request
Searching for the window
Creating a process with a hidden window
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckScreenResolution
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
ursnif
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Ursnif
Verdict:
Malicious
Result
Threat name:
Ursnif
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Creates a thread in another existing process (thread injection)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Suspicious Call by Ordinal
Sigma detected: Suspicious MSHTA Process Patterns
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes or reads registry keys via WMI
Writes registry values via WMI
Writes to foreign memory regions
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2022-01-19 10:50:14 UTC
File Type:
PE (Dll)
AV detection:
16 of 28 (57.14%)
Threat level:
5/5
Verdict:
malicious
Label(s):
gozi
Similar samples:
+ 335 additional samples on MalwareBazaar
Gathering data
Unpacked files
SH256 hash:
da9e5bcff0ad496dd7a8be8f8aac3d3105cc27f66b439822b9068964121aee6f
MD5 hash:
b234a6165764650f7d1efebe8209f569
SHA1 hash:
d6760b7834899d69b575f7f4e8a404aa5c90c56f
Detections:
win_isfb_auto
SH256 hash:
ba324de1866abaaef3893a76defa46ab60d2117d3cbda0f7f01d8580f662578e
MD5 hash:
3ac15ba3af8375a6b65ea629ca88eef2
SHA1 hash:
454980be0f3fc3d2e1fdd97e68c6e992ac6047c3
Detections:
win_isfb_auto
SH256 hash:
02bb7e5eda106943c37400103a651d11d1ebfd5f4b0a550874328c2c82340923
MD5 hash:
947fe47db34a2654fc7aa76ec2bebec0
SHA1 hash:
6e2d76945861c48a2e4552d87583c1a70e6525a2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.