MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 45a4adfc2e499622a94f9a664c080e73ffa87c52013a37f0447720c94b3ef497. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Gozi
Vendor detections: 11
| SHA256 hash: | 45a4adfc2e499622a94f9a664c080e73ffa87c52013a37f0447720c94b3ef497 |
|---|---|
| SHA3-384 hash: | 5bcc2e462085875d22894f31a4a831af6f84cb6c7a543fcbfdac7ff74459a6ae4f679d3c464ec14114057b7ead86c41c |
| SHA1 hash: | 51c98f8c55004b5851114b78f7c41636e9ff4539 |
| MD5 hash: | 39ba2ec136014d80d5eb8faf5c60cc50 |
| humanhash: | india-cat-maryland-social |
| File name: | 39ba2ec136014d80d5eb8faf5c60cc50 |
| Download: | download sample |
| Signature | Gozi |
| File size: | 364'544 bytes |
| First seen: | 2022-07-14 17:45:10 UTC |
| Last seen: | 2022-07-14 20:12:42 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 87dcc1cd4e3a51e19779358f134fcba5 (2 x Gozi) |
| ssdeep | 6144:DbujdaHhzdPeVeXV2WeyDwd57UmFUmrTvKf0M3Yk0iReiVyD48Ke:WxMzBe82sDwXtiybKvYXiBVys8 |
| Threatray | 2'938 similar samples on MalwareBazaar |
| TLSH | T17274E0E4E87BDD93F893813DEDCA31C2241C52EC4E97DD59DB20266048779AF98CB492 |
| TrID | 43.3% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 27.6% (.EXE) Win64 Executable (generic) (10523/12/4) 13.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 5.3% (.EXE) OS/2 Executable (generic) (2029/13) 5.2% (.EXE) Generic Win/DOS Executable (2002/3) |
| Reporter | |
| Tags: | dll Gozi gozi_ifsb |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Behaviour
Result
Behaviour
Malware Config
46.21.153.252
79.110.52.241
kimzooxl.at
deohomexm.at
79.110.52.244
23.227.202.64
Unpacked files
081b2f33473b7439b72b7fd1a01e4636b2ef6f768bb5dceaa862a23b91ecdacd
1291aee792d1f49011412897e2eea441837b2840271ca3a269a8f972ff1ff77d
45a4adfc2e499622a94f9a664c080e73ffa87c52013a37f0447720c94b3ef497
ab0577a42f963ea7cad0b3f5c43ed3a9165e84cefd47144d3f6fc05a951d3ea1
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | win_isfb_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.isfb. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.