MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 236f2a9fcc1176a802946828029465d054626f92d258015f8abccdc52d2365e7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 236f2a9fcc1176a802946828029465d054626f92d258015f8abccdc52d2365e7
SHA3-384 hash: 5aa67a98097af7329a2633d816f2a2afa009e3199b3d36375d0c9f73fc2f7491e848d2ff69c715ee13edcc80a9a1ff47
SHA1 hash: 0b54adf6c018ab02f93b4faf68f64a7623d1b7b2
MD5 hash: 431c575587d9938ba31a73b4fdbef08b
humanhash: wyoming-william-carbon-potato
File name:server.exe
Download: download sample
Signature Gozi
File size:329'216 bytes
First seen:2023-03-06 15:54:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0309f345269cd9af3b42f8f4aa807e76 (3 x Gozi, 3 x Smoke Loader, 1 x Rhadamanthys)
ssdeep 3072:WpuIWHR3foxLjSafmuaXZus/rutDMZDXvCXzdVKu6HR/ayjGZEOF:bH2xLjhmlDruWFXvSM9xaeE
Threatray 232 similar samples on MalwareBazaar
TLSH T12064CF2276E1C072F1AB09749860DBE02B7FB4E35B74C6DB37A4166E1E302D15A76327
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
16.0% (.EXE) Win32 Executable (generic) (4505/5/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 001edecaa48c8a88 (1 x Gozi)
Reporter JAMESWT_WT
Tags:exe Gozi ITA MEF mise Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
271
Origin country :
IT IT
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
server.exe
Verdict:
Malicious activity
Analysis date:
2023-03-06 15:56:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Launching a process
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
75%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.Stop
Status:
Malicious
First seen:
2023-03-06 16:02:40 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
20 of 25 (80.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi botnet:7710 banker isfb trojan
Behaviour
Gozi
Malware Config
C2 Extraction:
checklist.skype.com
62.173.140.103
31.41.44.63
46.8.19.239
185.77.96.40
46.8.19.116
31.41.44.48
62.173.139.11
62.173.138.251
Unpacked files
SH256 hash:
4c62f159d20fb1fbd9423d0c45ad9020b668c7c59d01e489ad99657433b847f1
MD5 hash:
b91133cfe8cba566e105419ecfec37b3
SHA1 hash:
2231db31822e3684789b0a5355523368214139e6
SH256 hash:
236f2a9fcc1176a802946828029465d054626f92d258015f8abccdc52d2365e7
MD5 hash:
431c575587d9938ba31a73b4fdbef08b
SHA1 hash:
0b54adf6c018ab02f93b4faf68f64a7623d1b7b2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments