MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f805d9595b1267aec6f8620a5b6e7d544047c8be2523537bb4a2a6c418dbbe2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 3f805d9595b1267aec6f8620a5b6e7d544047c8be2523537bb4a2a6c418dbbe2
SHA3-384 hash: 85b70d5ed8c49cf25f3919acb60088af5209c172df4feda51bee407200790e8a1e903481d3df6fa1b4b7d74d6059c464
SHA1 hash: dbaf5ab7acfefa30137253d871691233c0c25e35
MD5 hash: 6cc2e45c976e46fd9c813462d7fe40fa
humanhash: avocado-alpha-angel-carpet
File name:Ih5Ndh.dll
Download: download sample
Signature Gozi
File size:503'808 bytes
First seen:2022-12-06 17:12:29 UTC
Last seen:2022-12-06 18:29:03 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 37f03823c03476ea1f0ab9ed79cfd4ee (1 x Gozi)
ssdeep 6144:7tkZIOdi1a/nGAHSzssd4BxrobrVvEp5HH6ZUNCVcj9lVMJ:mIuiA/nry9u8HU8UNGA9lVM
Threatray 590 similar samples on MalwareBazaar
TLSH T1AEB4F126DCE221ACD1E54035DEC773F272F8B604632AE6E3C6E564850757AF903B85B2
TrID 45.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.3% (.EXE) OS/2 Executable (generic) (2029/13)
18.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.0% (.EXE) DOS Executable Generic (2000/1)
Reporter JAMESWT_WT
Tags:dhl italy dll Gozi isfb tnt italy Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
238
Origin country :
IT IT
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
emotet gozi greyware packed ursnif virus
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Disables SPDY (HTTP compression, likely to perform web injects)
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Self deletion via cmd or bat file
Sigma detected: Dot net compiler compiles file from suspicious location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes registry values via WMI
Writes to foreign memory regions
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 761878 Sample: Ih5Ndh.dll Startdate: 06/12/2022 Architecture: WINDOWS Score: 100 67 Snort IDS alert for network traffic 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 Antivirus detection for URL or domain 2->71 73 3 other signatures 2->73 9 mshta.exe 19 2->9         started        11 loaddll32.exe 1 2->11         started        process3 process4 13 powershell.exe 1 28 9->13         started        17 cmd.exe 1 11->17         started        19 conhost.exe 11->19         started        file5 57 C:\Users\user\AppData\...\nh1csu3e.cmdline, Unicode 13->57 dropped 103 Injects code into the Windows Explorer (explorer.exe) 13->103 105 Writes to foreign memory regions 13->105 107 Modifies the context of a thread in another process (thread injection) 13->107 109 2 other signatures 13->109 21 explorer.exe 3 14 13->21 injected 25 csc.exe 3 13->25         started        28 csc.exe 3 13->28         started        30 conhost.exe 13->30         started        32 rundll32.exe 6 17->32         started        signatures6 process7 dnsIp8 59 dioxvoxll.com 123.213.233.194, 49717, 80 SKB-ASSKBroadbandCoLtdKR Korea Republic of 21->59 87 Tries to steal Mail credentials (via file / registry access) 21->87 89 Changes memory attributes in foreign processes to executable or writable 21->89 91 Self deletion via cmd or bat file 21->91 99 2 other signatures 21->99 34 cmd.exe 1 21->34         started        37 RuntimeBroker.exe 21->37 injected 39 cmd.exe 21->39         started        53 C:\Users\user\AppData\Local\...\nh1csu3e.dll, PE32 25->53 dropped 41 cvtres.exe 1 25->41         started        55 C:\Users\user\AppData\Local\...\s4m0xpfs.dll, PE32 28->55 dropped 43 cvtres.exe 1 28->43         started        61 dendexmm.com 222.236.49.123, 49713, 49714, 49715 SKB-ASSKBroadbandCoLtdKR Korea Republic of 32->61 63 optinetwork.top 31.41.44.51, 49705, 80 ASRELINKRU Russian Federation 32->63 65 interspin.top 32->65 93 System process connects to network (likely due to code injection or exploit) 32->93 95 Writes to foreign memory regions 32->95 97 Allocates memory in foreign processes 32->97 101 3 other signatures 32->101 45 control.exe 1 32->45         started        file9 signatures10 process11 signatures12 75 Uses ping.exe to sleep 34->75 77 Uses ping.exe to check the status of other devices and networks 34->77 47 conhost.exe 34->47         started        49 PING.EXE 1 34->49         started        79 Changes memory attributes in foreign processes to executable or writable 45->79 81 Injects code into the Windows Explorer (explorer.exe) 45->81 83 Writes to foreign memory regions 45->83 85 4 other signatures 45->85 51 rundll32.exe 45->51         started        process13
Threat name:
Win32.Trojan.Zenpack
Status:
Malicious
First seen:
2022-12-06 15:19:35 UTC
File Type:
PE (Dll)
AV detection:
26 of 41 (63.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi botnet:5050 banker isfb trojan
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Gozi
Malware Config
C2 Extraction:
config.edge.skype.com
optinetwork.top
interspin.top
dendexmm.com
Unpacked files
SH256 hash:
f854461c75aa9343b92072f43cf1bc0c467555b7f77da18ccde4becb49725954
MD5 hash:
b0b87003579e4801af192297b250963b
SHA1 hash:
e6b7466b6728c05942503128ed64248595c213ad
Detections:
ISFB_Main win_isfb_auto
SH256 hash:
23d4db43ec8402db04007541bc08292d793ce9f1776bd708c2cf1f3187479e46
MD5 hash:
fd7ca45bc6297b7fc6642941764fb503
SHA1 hash:
9cf03b6f693a1801e7580fe2431a685f21b9fa45
SH256 hash:
3f805d9595b1267aec6f8620a5b6e7d544047c8be2523537bb4a2a6c418dbbe2
MD5 hash:
6cc2e45c976e46fd9c813462d7fe40fa
SHA1 hash:
dbaf5ab7acfefa30137253d871691233c0c25e35
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments