MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16dd0142263b0ecdd025ec808a6bdd74277eee53c1d9d6c603aafe460f9431d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 16dd0142263b0ecdd025ec808a6bdd74277eee53c1d9d6c603aafe460f9431d1
SHA3-384 hash: 266e89c161c0536e183cfd3e032c4c356744fcdefc944c4e543ab803bbf6c4817e89a1f37ce27aec3c4369c41bd02403
SHA1 hash: c76396617dea8f799767b604bad11ae462a95680
MD5 hash: 5c9cc62723d18f4ba2fbdef4fbd63f37
humanhash: green-speaker-vermont-jig
File name:dws.dll
Download: download sample
Signature Gozi
File size:518'656 bytes
First seen:2020-06-03 18:07:12 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 03d2bc599c55bd5b2fb46da82b90ff7c (8 x Gozi)
ssdeep 12288:v/4qkMxNyHaVbBvXA2odiPyig6SnbKcn1Skkps3FsAT:Imw2BvXAdiKMUyAT
Threatray 146 similar samples on MalwareBazaar
TLSH ADB49E6237F80411F2BB4F3848F205119BFEBED5D978C69947C1229909EB290AB7C797
Reporter abuse_ch
Tags:dll geo GMX Gozi POL ZLoader


Avatar
abuse_ch
Malspam distributing ZLoader:

HELO: mout-xforward.gmx.com
Sending IP: 82.165.159.130
From: PLAY 24 <hymie5xeobut@mail.com>
Subject: efaktura
Attachment: faktura_484.xls

ZLoader payload URL:
http://ogglededibl.at/3/dws.dll

ZLoader C2:
militanttra.at

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Cridex
Status:
Malicious
First seen:
2020-06-03 18:35:32 UTC
AV detection:
17 of 31 (54.84%)
Threat level:
  5/5
Result
Malware family:
zloader
Score:
  10/10
Tags:
family:zloader botnet:bot5 campaign:bot5 botnet persistence trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Adds Run key to start application
Zloader, Terdot, DELoader, ZeusSphinx
Malware Config
C2 Extraction:
https://militanttra.at/owg.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Gozi

DLL dll 16dd0142263b0ecdd025ec808a6bdd74277eee53c1d9d6c603aafe460f9431d1

(this sample)

  
Delivery method
Distributed via web download

Comments