MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0b3d641004b2a730cd86a3131f6ae569e6692c03368dd1ac17f14bfd395e5bcb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 13


Intelligence 13 IOCs YARA 2 File information Comments

SHA256 hash: 0b3d641004b2a730cd86a3131f6ae569e6692c03368dd1ac17f14bfd395e5bcb
SHA3-384 hash: 64d7d890fd4973538f7bccda09ccffe9d84b9cc2d66e3772a09e21d5aebecceaac25c3a921eba4c49df7fb505d0ff0bd
SHA1 hash: 951653c427fba382fd7894be3804bb4b34091d65
MD5 hash: 471d596dad7ca027a44b21f3c3a2a0d9
humanhash: india-alanine-iowa-oregon
File name:6492b95549ad6.dll
Download: download sample
Signature Gozi
File size:2'131'456 bytes
First seen:2023-06-21 08:52:44 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 8108ef23ac88cc59ee0c5fc0d31ef541 (1 x Gozi)
ssdeep 49152:qja99TJ1yOmI6n2nADd4cGNls40FjDhnr8Vti:qI9l1yOmhn2nADdAN4AVw
Threatray 194 similar samples on MalwareBazaar
TLSH T146A5AF0FD9D9DF42C86A5432DADF48A089B7D461AF528E23373D5A6031272187BDB72C
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter JAMESWT_WT
Tags:agenziaentrate balkun-com dll Gozi isfb ITA Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
333
Origin country :
IT IT
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
DNS request
Sending a custom TCP request
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Disables SPDY (HTTP compression, likely to perform web injects)
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Writes to foreign memory regions
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 891910 Sample: 6492b95549ad6.dll Startdate: 21/06/2023 Architecture: WINDOWS Score: 100 100 Snort IDS alert for network traffic 2->100 102 Found malware configuration 2->102 104 Malicious sample detected (through community Yara rule) 2->104 106 3 other signatures 2->106 8 loaddll32.exe 7 2->8         started        12 mshta.exe 2->12         started        14 mshta.exe 2->14         started        16 mshta.exe 2->16         started        process3 dnsIp4 96 njamma.com 8->96 98 avas1ta.com 8->98 140 Writes to foreign memory regions 8->140 142 Writes or reads registry keys via WMI 8->142 144 Writes registry values via WMI 8->144 18 rundll32.exe 8->18         started        22 regsvr32.exe 1 6 8->22         started        24 cmd.exe 1 8->24         started        33 4 other processes 8->33 26 powershell.exe 12->26         started        29 powershell.exe 14->29         started        31 powershell.exe 16->31         started        signatures5 process6 dnsIp7 88 avas1ta.com 18->88 108 System process connects to network (likely due to code injection or exploit) 18->108 110 Maps a DLL or memory area into another process 18->110 35 control.exe 18->35         started        90 njamma.com 91.215.85.171, 49717, 49718, 49719 PINDC-ASRU Russian Federation 22->90 92 avas1ta.com 22->92 112 Writes or reads registry keys via WMI 22->112 114 Writes registry values via WMI 22->114 38 control.exe 22->38         started        40 rundll32.exe 24->40         started        74 C:\Users\user\AppData\...\fj0eseqh.cmdline, Unicode 26->74 dropped 116 Injects code into the Windows Explorer (explorer.exe) 26->116 118 Writes to foreign memory regions 26->118 120 Modifies the context of a thread in another process (thread injection) 26->120 122 Found suspicious powershell code related to unpacking or dynamic code loading 26->122 42 explorer.exe 26->42 injected 44 csc.exe 26->44         started        47 2 other processes 26->47 124 Creates a thread in another existing process (thread injection) 29->124 49 3 other processes 29->49 51 3 other processes 31->51 53 3 other processes 33->53 file8 signatures9 process10 dnsIp11 126 Maps a DLL or memory area into another process 35->126 56 rundll32.exe 35->56         started        58 rundll32.exe 38->58         started        128 System process connects to network (likely due to code injection or exploit) 40->128 130 Writes registry values via WMI 40->130 60 WerFault.exe 7 11 40->60         started        132 Writes to foreign memory regions 42->132 134 Allocates memory in foreign processes 42->134 136 Modifies the context of a thread in another process (thread injection) 42->136 138 2 other signatures 42->138 70 3 other processes 42->70 76 C:\Users\user\AppData\Local\...\fj0eseqh.dll, PE32 44->76 dropped 62 cvtres.exe 44->62         started        78 C:\Users\user\AppData\Local\...\gyupqd0c.dll, PE32 47->78 dropped 64 cvtres.exe 47->64         started        80 C:\Users\user\AppData\Local\...\w5owbzri.dll, PE32 49->80 dropped 82 C:\Users\user\AppData\Local\...\uraocxdb.dll, PE32 49->82 dropped 66 cvtres.exe 49->66         started        68 cvtres.exe 49->68         started        84 C:\Users\user\AppData\Local\...\tawkv2v1.dll, PE32 51->84 dropped 86 C:\Users\user\AppData\Local\...\p2algqht.dll, PE32 51->86 dropped 72 2 other processes 51->72 94 192.168.2.1 unknown unknown 53->94 file12 signatures13 process14
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2023-06-21 08:52:53 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi botnet:5050 banker isfb persistence trojan
Behaviour
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Gozi
Malware Config
C2 Extraction:
https://avas1ta.com/in/login/
njamma.com
https://avas1t.de/in/loginq/
Unpacked files
SH256 hash:
d25fdf53b1c0f20144d52a629b92738e874272cc230ac488fbfa3c8fb0de54e3
MD5 hash:
4c0271ff3e132f930f3ddbdd758719c0
SHA1 hash:
eda2ea2c97dc994b6ee1d2812cc946028dc3c8f2
SH256 hash:
0b3d641004b2a730cd86a3131f6ae569e6692c03368dd1ac17f14bfd395e5bcb
MD5 hash:
471d596dad7ca027a44b21f3c3a2a0d9
SHA1 hash:
951653c427fba382fd7894be3804bb4b34091d65
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:bumblebee_win_generic
Author:_kphi
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 0b3d641004b2a730cd86a3131f6ae569e6692c03368dd1ac17f14bfd395e5bcb

(this sample)

  
Delivery method
Distributed via web download

Comments