MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 36951cd0c31ff059ad5b16f88854d188625558db72faa5c2ded56cb0182fbe8c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: 36951cd0c31ff059ad5b16f88854d188625558db72faa5c2ded56cb0182fbe8c
SHA3-384 hash: f94def918d8db659ae34ade6562143444d3ad5e9a24cf378c1cdc52533d18c3cc713383fff36db726194181de7ad5e9f
SHA1 hash: a2408b671857e5be739c77bf3568140303ccc912
MD5 hash: 95deb94156c4b9bd4e4e3b62d2237268
humanhash: bravo-nitrogen-hawaii-spring
File name:bespokemerchandises.com_wrong__18B7Ai1.exe.malw
Download: download sample
Signature Gozi
File size:334'838 bytes
First seen:2020-05-21 13:29:11 UTC
Last seen:2020-05-21 15:58:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c8c95a8437da5797cf192c4cf27b186f (327 x Gozi)
ssdeep 3072:leYLrN2UApXRBZaKBEd/UslN0r//a0tziOOdltWdnDhNu:4Y9peR+KBjziOOPtWdnDv
Threatray 552 similar samples on MalwareBazaar
TLSH 30647691A953DF7DD09C25B6E5ED0B0610A2F4284F078B976E180D703FA3EA2E69435F
Reporter ov3rflow1
Tags:malw

Code Signing Certificate

Organisation:UTN-USERFirst-Object
Issuer:AddTrust External CA Root
Algorithm:sha1WithRSAEncryption
Valid from:Jun 7 08:09:10 2005 GMT
Valid to:May 30 10:48:38 2020 GMT
Serial number: 421AF2940984191F520A4BC62426A74B
Intelligence: 307 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2CF1EC6AB594113BD538DF6D5C940E3319B424F8756D975888072C6AB558B771
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2020-05-21 12:51:41 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments