MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c7c8fbdd41335948ff0b7e67b905c242865a59c55a4809bf6a5fe4beeee83d9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 3c7c8fbdd41335948ff0b7e67b905c242865a59c55a4809bf6a5fe4beeee83d9
SHA3-384 hash: 8b2963b6cc9a0d672048e74000c6de55fe6bb91b728220cd7260ec69098d7fe82c5b1a5d89c9a4546a342a239994cccd
SHA1 hash: be7197172cbb3640c12d4890333ebbab347e6c08
MD5 hash: b69c4c8220ae9ee5b450cc766834d5d7
humanhash: berlin-rugby-north-romeo
File name:haao11.cab
Download: download sample
Signature Gozi
File size:184'832 bytes
First seen:2020-05-28 17:04:46 UTC
Last seen:2020-05-28 18:18:13 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 0db88b241a104cf2d60e7705133f5ce1 (2 x Gozi)
ssdeep 3072:ccteTH9qPc25JZymHhbeLcMpt+zdnR8PT2fnLOJvyiUoJhffGpLWJEfgNsXkWEiA:JE9qPZRyvLxEcgbiznfBWfg2kW+8sB
Threatray 869 similar samples on MalwareBazaar
TLSH 1B048D7471C1C132E42D16385C21D4E8B7BEFD008A646D9772C91F2F6E3B9D18DA8BA6
Reporter abuse_ch
Tags:dll geo Gozi USA Valak


Avatar
abuse_ch
Valak payload URL:
http://wola4ru08w9i7jjpuc.com/urvave/cennc.php?l=haao11.cab

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'855
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-05-28 17:36:18 UTC
File Type:
PE (Dll)
AV detection:
24 of 48 (50.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:valak Loader
Behaviour
Suspicious use of WriteProcessMemory
JavaScript code in executable
Valak
Valak JavaScript Loader
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

34a4a8b54fd6bdd69aa4cefbb4d8fa9f

Gozi

DLL dll 3c7c8fbdd41335948ff0b7e67b905c242865a59c55a4809bf6a5fe4beeee83d9

(this sample)

  
Dropped by
MD5 34a4a8b54fd6bdd69aa4cefbb4d8fa9f
  
Delivery method
Distributed via web download

Comments