MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1f22836a61a81e1985074d64fcfcf30f7f94bf198b409531cd5632da1c3f2df7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Gozi
Vendor detections: 12
| SHA256 hash: | 1f22836a61a81e1985074d64fcfcf30f7f94bf198b409531cd5632da1c3f2df7 |
|---|---|
| SHA3-384 hash: | e28ccdd207259f95b5bef28ed9863052baa4eacccbba4952b4b52037e3fea6fab4878842004470a9685b91064dd5b8b0 |
| SHA1 hash: | ccaab62608ebf84af6f86a4833835bdec6ea63d9 |
| MD5 hash: | 620486432073a19eab114ba312dadb7e |
| humanhash: | bravo-grey-carpet-mike |
| File name: | 22.dll |
| Download: | download sample |
| Signature | Gozi |
| File size: | 291'840 bytes |
| First seen: | 2021-03-03 23:33:43 UTC |
| Last seen: | 2021-03-04 08:15:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 648f24612472602127cb556bb3c471fd (1 x Gozi) |
| ssdeep | 6144:xG/INKaKs6Pp2dPkukibOwxc+u6QSamDRaWVUHmQaTelN:xsINnv6Pp2uuVbnNRaWVUHmQaKlN |
| Threatray | 146 similar samples on MalwareBazaar |
| TLSH | 74541831B401C59BC0A72B39A454E3A477D97C538879A8837BD92FEF6B2F0825C62F51 |
| Reporter | |
| Tags: | 2200 dll Gozi isfb |
Intelligence
File Origin
# of uploads :
3
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Ursnif3
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Ursnif
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Found malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: MSHTA Spawning Windows Shell
Suspicious powershell command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.ZLoader
Status:
Suspicious
First seen:
2021-03-03 23:34:19 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
9 of 48 (18.75%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 136 additional samples on MalwareBazaar
Result
Malware family:
gozi_ifsb
Score:
10/10
Tags:
family:gozi_ifsb botnet:2200 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
golang.feel500.at/api1
go.in100k.at/api1
Unpacked files
SH256 hash:
8a06f6660355b6b393f3ef0c42e148ad2f94e5677c375ddf415f733b06fcef32
MD5 hash:
f52995516bb061fa7bc7f788b131cb68
SHA1 hash:
b8a808b508e57794aae41dc3e6d9ae64be0c0cce
Detections:
win_isfb_auto
Parent samples :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 hash:
1f22836a61a81e1985074d64fcfcf30f7f94bf198b409531cd5632da1c3f2df7
MD5 hash:
620486432073a19eab114ba312dadb7e
SHA1 hash:
ccaab62608ebf84af6f86a4833835bdec6ea63d9
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Delivery method
Other
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.