MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 43b3014c1627c40c31c724e1a7b1dee4ef51428e2f68adad93c0df95f454275d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments 1

SHA256 hash: 43b3014c1627c40c31c724e1a7b1dee4ef51428e2f68adad93c0df95f454275d
SHA3-384 hash: 521a8c3edf3da286f8358c76f7dbf67b00300aba0cd5c85b7783dc2c9eb3c07d06a982f0ca3166e8b0ebd929561a7653
SHA1 hash: c9e781b8635ed954176f10ed32b22e3832f5d408
MD5 hash: a1acba462ec14ddccbc4fa7aedcc8f3f
humanhash: fillet-carbon-double-seventeen
File name:a1acba462ec14ddccbc4fa7aedcc8f3f.dll
Download: download sample
Signature Gozi
File size:898'048 bytes
First seen:2021-04-23 17:40:10 UTC
Last seen:2021-04-23 18:50:15 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 144296335e11e836679bbc0168a3f68e (5 x Gozi)
ssdeep 12288:PvidtsMhSvt4ZWeWQFlBegSwCHO+ExeaIsrscw05c7BBC8emGjRPmW/7/zVjbZw2:PvidKMhy7erlBegS7esa5cDKjeA42
Threatray 210 similar samples on MalwareBazaar
TLSH F715CF2238C1C232D9636438097AD1A08BBCB4241D2697BF73DC7B7E1F7659252359EB
Reporter abuse_ch
Tags:dll Gozi isfb Shathak TA551 Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
314
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Found malware configuration
Multi AV Scanner detection for submitted file
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 396792 Sample: VNDbHGeoKr.dll Startdate: 23/04/2021 Architecture: WINDOWS Score: 68 71 Found malware configuration 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 Yara detected  Ursnif 2->75 10 loaddll32.exe 1 2->10         started        process3 process4 12 rundll32.exe 10->12         started        15 cmd.exe 1 10->15         started        17 rundll32.exe 10->17         started        19 5 other processes 10->19 signatures5 77 Writes registry values via WMI 12->77 21 cmd.exe 1 12->21         started        23 cmd.exe 1 12->23         started        25 rundll32.exe 15->25         started        27 cmd.exe 1 17->27         started        29 cmd.exe 1 17->29         started        31 cmd.exe 1 19->31         started        33 cmd.exe 1 19->33         started        35 cmd.exe 1 19->35         started        37 cmd.exe 1 19->37         started        process6 process7 39 conhost.exe 21->39         started        41 conhost.exe 23->41         started        43 cmd.exe 1 25->43         started        45 cmd.exe 1 25->45         started        47 conhost.exe 27->47         started        49 conhost.exe 29->49         started        51 conhost.exe 31->51         started        53 conhost.exe 33->53         started        55 conhost.exe 35->55         started        process8 57 cmd.exe 1 43->57         started        59 cmd.exe 1 43->59         started        61 conhost.exe 43->61         started        63 conhost.exe 45->63         started        65 conhost.exe 45->65         started        process9 67 conhost.exe 57->67         started        69 conhost.exe 59->69         started       
Threat name:
Win32.Trojan.Sdum
Status:
Malicious
First seen:
2021-04-23 17:40:14 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:4460 banker trojan
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
1.microsoft.com
horulenuke.us
vorulenuke.us
Unpacked files
SH256 hash:
8b60839ed38f8bf7989b27631a36bc05b87089048613f713ab6f673b47734dfd
MD5 hash:
a8888997f3fbd480e3b16178ca1089f5
SHA1 hash:
c990528c6c7fa51a0209dd1a8683710d95edebc4
Detections:
win_isfb_auto
SH256 hash:
43b3014c1627c40c31c724e1a7b1dee4ef51428e2f68adad93c0df95f454275d
MD5 hash:
a1acba462ec14ddccbc4fa7aedcc8f3f
SHA1 hash:
c9e781b8635ed954176f10ed32b22e3832f5d408
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ursnif3
Author:kevoreilly
Description:Ursnif Payload
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 43b3014c1627c40c31c724e1a7b1dee4ef51428e2f68adad93c0df95f454275d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-23 18:03:29 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0012.001] Anti-Static Analysis::Argument Obfuscation
1) [C0026.002] Data Micro-objective::XOR::Encode Data
3) [C0051] File System Micro-objective::Read File
4) [C0052] File System Micro-objective::Writes File
5) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
6) [C0040] Process Micro-objective::Allocate Thread Local Storage
7) [C0017] Process Micro-objective::Create Process
8) [C0038] Process Micro-objective::Create Thread
9) [C0041] Process Micro-objective::Set Thread Local Storage Value
10) [C0018] Process Micro-objective::Terminate Process