MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4410cfd4fd242717a56d892466b563576af0ca4dd4738ab52a8ad818c2386073. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 4410cfd4fd242717a56d892466b563576af0ca4dd4738ab52a8ad818c2386073
SHA3-384 hash: 4f873bb61f0eb9ce28bda6653e190687a888605afc9fedb7edcb40e0cd4fdf55d4b622223e9784f4a9db1fcb035444e8
SHA1 hash: ba6d8a960727a3cb6d12be0f0f99e08e8acfc02e
MD5 hash: a032d134cf0aafcf151d28f7cd7a8262
humanhash: oranges-mango-maryland-michigan
File name:2020-07-09-Ursnif-DLL-example-09-of-10.bin
Download: download sample
Signature Gozi
File size:284'160 bytes
First seen:2020-07-11 07:04:52 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 315e8cf9a992171676708733e8d63a48 (10 x Gozi)
ssdeep 6144:qi8xuEVAaWrI54Pv8G4/prLvGiyvkV2KV:n8x9AaO2ov3kTakRV
Threatray 711 similar samples on MalwareBazaar
TLSH 2654BE0076D0E8B4E42E42388C60CAA5877EBD21EB7899E777D85F0F6E615C05E71F62
Reporter JAMESWT_WT
Tags:Gozi Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
353
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Creating a window
Searching for the window
DNS request
Creating a file
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2020-07-10 10:44:13 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Checks whether UAC is enabled
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of FindShellTrayWindow
Checks whether UAC is enabled
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments