MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1f22836a61a81e1985074d64fcfcf30f7f94bf198b409531cd5632da1c3f2df7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 1f22836a61a81e1985074d64fcfcf30f7f94bf198b409531cd5632da1c3f2df7
SHA3-384 hash: e28ccdd207259f95b5bef28ed9863052baa4eacccbba4952b4b52037e3fea6fab4878842004470a9685b91064dd5b8b0
SHA1 hash: ccaab62608ebf84af6f86a4833835bdec6ea63d9
MD5 hash: 620486432073a19eab114ba312dadb7e
humanhash: bravo-grey-carpet-mike
File name:22.dll
Download: download sample
Signature Gozi
File size:291'840 bytes
First seen:2021-03-03 23:33:43 UTC
Last seen:2021-03-04 08:15:02 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 648f24612472602127cb556bb3c471fd (1 x Gozi)
ssdeep 6144:xG/INKaKs6Pp2dPkukibOwxc+u6QSamDRaWVUHmQaTelN:xsINnv6Pp2uuVbnNRaWVUHmQaKlN
Threatray 146 similar samples on MalwareBazaar
TLSH 74541831B401C59BC0A72B39A454E3A477D97C538879A8837BD92FEF6B2F0825C62F51
Reporter Cryptolaemus1
Tags:2200 dll Gozi isfb

Intelligence


File Origin
# of uploads :
3
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Found malware configuration
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: MSHTA Spawning Windows Shell
Suspicious powershell command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 362479 Sample: 22.dll Startdate: 04/03/2021 Architecture: WINDOWS Score: 100 60 c56.lepini.at 2->60 62 resolver1.opendns.com 2->62 64 api3.lepini.at 2->64 86 Multi AV Scanner detection for domain / URL 2->86 88 Found malware configuration 2->88 90 Malicious sample detected (through community Yara rule) 2->90 92 4 other signatures 2->92 9 mshta.exe 2->9         started        12 loaddll32.exe 1 2->12         started        14 mshta.exe 2->14         started        signatures3 process4 signatures5 94 Suspicious powershell command line found 9->94 16 powershell.exe 9->16         started        19 regsvr32.exe 12->19         started        21 cmd.exe 1 12->21         started        23 rundll32.exe 2 12->23         started        25 powershell.exe 14->25         started        process6 file7 74 Modifies the context of a thread in another process (thread injection) 16->74 76 Maps a DLL or memory area into another process 16->76 78 Compiles code for process injection (via .Net compiler) 16->78 28 csc.exe 16->28         started        31 conhost.exe 16->31         started        80 Writes or reads registry keys via WMI 19->80 82 Writes registry values via WMI 19->82 33 iexplore.exe 2 91 21->33         started        52 C:\Users\user\AppData\Local\...\l54sfw4i.0.cs, UTF-8 25->52 dropped 54 C:\Users\user\AppData\...\frmdhvpf.cmdline, UTF-8 25->54 dropped 84 Creates a thread in another existing process (thread injection) 25->84 35 csc.exe 25->35         started        37 conhost.exe 25->37         started        signatures8 process9 file10 56 C:\Users\user\AppData\Local\...\fmhqhdsx.dll, PE32 28->56 dropped 39 cvtres.exe 28->39         started        41 iexplore.exe 153 33->41         started        44 iexplore.exe 33->44         started        46 iexplore.exe 33->46         started        50 3 other processes 33->50 58 C:\Users\user\AppData\Local\...\frmdhvpf.dll, PE32 35->58 dropped 48 cvtres.exe 35->48         started        process11 dnsIp12 66 img.img-taboola.com 41->66 68 edge.gycpi.b.yahoodns.net 87.248.118.23, 443, 49732, 49733 YAHOO-DEBDE United Kingdom 41->68 72 10 other IPs or domains 41->72 70 api10.laptok.at 34.65.108.95, 49766, 49767, 49768 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 44->70
Threat name:
Win32.Backdoor.ZLoader
Status:
Suspicious
First seen:
2021-03-03 23:34:19 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
9 of 48 (18.75%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:2200 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
Unpacked files
SH256 hash:
1f22836a61a81e1985074d64fcfcf30f7f94bf198b409531cd5632da1c3f2df7
MD5 hash:
620486432073a19eab114ba312dadb7e
SHA1 hash:
ccaab62608ebf84af6f86a4833835bdec6ea63d9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments