MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f5cce66023859e9d7e3f54b78e95bf09618db5ed01fe05b765d76ab156271da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 0f5cce66023859e9d7e3f54b78e95bf09618db5ed01fe05b765d76ab156271da
SHA3-384 hash: 4ddea7503571d709cb1b69084e2e747dc12b2cff68be4f8b0d334fcc0f45d4b50157eb935897bbc5f6eab37c5c823729
SHA1 hash: 8d0bd57712533f1a889627706925c17ed4347ce5
MD5 hash: 9676298f24c8cdd4b532ac027a00f60e
humanhash: kilo-pizza-magazine-colorado
File name:main.exe
Download: download sample
Signature Gozi
File size:37'888 bytes
First seen:2022-11-16 01:07:02 UTC
Last seen:2022-11-16 02:36:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1640d668d1471f340cbe565fe63522f6 (15 x Gozi)
ssdeep 768:/QLm41fM01vAqyRrlpItKFyr8MS1g7/s1w70anLq:/L41fMSvXArbYVrO0/saLq
Threatray 1'184 similar samples on MalwareBazaar
TLSH T19503E1967C6D152DDFDF82B22B2F618087392331565A50B4737F242F9A43D1B407B263
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter 1ZRR4H
Tags:exe Gozi

Intelligence


File Origin
# of uploads :
2
# of downloads :
223
Origin country :
CL CL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
main.exe
Verdict:
No threats detected
Analysis date:
2022-11-16 01:09:04 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
gozi packed ursnif zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 747122 Sample: main.exe Startdate: 16/11/2022 Architecture: WINDOWS Score: 100 18 lentaphoto.at 2->18 24 Snort IDS alert for network traffic 2->24 26 Malicious sample detected (through community Yara rule) 2->26 28 Antivirus / Scanner detection for submitted sample 2->28 30 3 other signatures 2->30 8 main.exe 6 2->8         started        12 mshta.exe 19 2->12         started        signatures3 process4 dnsIp5 20 iujdhsndjfks.ru 134.0.118.203, 49698, 80 AS-REGRU Russian Federation 8->20 22 lentaphoto.at 8->22 32 Writes or reads registry keys via WMI 8->32 34 Writes registry values via WMI 8->34 14 powershell.exe 15 12->14         started        signatures6 process7 process8 16 conhost.exe 14->16         started       
Threat name:
Win32.Infostealer.Gozi
Status:
Malicious
First seen:
2022-11-16 01:08:06 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi botnet:5 banker isfb trojan
Behaviour
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Gozi
Malware Config
C2 Extraction:
lentaphoto.at
iujdhsndjfks.ru
gameindikdowd.ru
jhgfdlkjhaoiu.su
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
69937b53c7cbd3067deb7c3a5d83e3af920c216128a4864f0475d81fcffb6c1c
MD5 hash:
e0d21d314c832d15bcae944e2c2b05cb
SHA1 hash:
2e407b8933f7ca1b705ca99eda8dbb2168679aba
Detections:
ISFB_Main win_isfb_auto
SH256 hash:
0f5cce66023859e9d7e3f54b78e95bf09618db5ed01fe05b765d76ab156271da
MD5 hash:
9676298f24c8cdd4b532ac027a00f60e
SHA1 hash:
8d0bd57712533f1a889627706925c17ed4347ce5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments