MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4b1ff2f9354e2504464ca3bd74e20ff25aa57084a871e81bada09523fa4327e1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 4b1ff2f9354e2504464ca3bd74e20ff25aa57084a871e81bada09523fa4327e1
SHA3-384 hash: 46895f0f6717011344ba21931592bd29cd8439acd2d46d14e3d2bb533f68e750ca36bd2edd3c2ddef913b4648fee0da5
SHA1 hash: fb58fd8e30bc85378affe40d90fba2f05d721d92
MD5 hash: 95da98c0a63160a3cef05cc23aa28dab
humanhash: angel-magazine-carolina-shade
File name:95da98c0a63160a3cef05cc23aa28dab.dll
Download: download sample
Signature Gozi
File size:960'000 bytes
First seen:2021-05-09 06:07:49 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 7a79d10b1d4343a18a4f6e25e165b4ae (62 x Gozi)
ssdeep 24576:HQfpzjXPgfA8CJV4X+IBIJ3cazaLwj1mCG9CpNiLi:IFDg0JV4OaIRj150CpNiLi
Threatray 241 similar samples on MalwareBazaar
TLSH F715C03138C1C232D573A0780A69D6B04BADB4301D359B9F77DC2B7E6F715A092369AB
Reporter abuse_ch
Tags:dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
261
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Sending a custom TCP request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 408938 Sample: xPS72JyyD3.dll Startdate: 09/05/2021 Architecture: WINDOWS Score: 48 63 Multi AV Scanner detection for submitted file 2->63 9 loaddll32.exe 1 2->9         started        process3 process4 11 rundll32.exe 9->11         started        13 cmd.exe 1 9->13         started        15 rundll32.exe 9->15         started        17 5 other processes 9->17 process5 19 cmd.exe 1 11->19         started        21 cmd.exe 1 11->21         started        23 rundll32.exe 13->23         started        25 cmd.exe 1 15->25         started        27 cmd.exe 1 15->27         started        29 cmd.exe 1 17->29         started        31 cmd.exe 1 17->31         started        33 cmd.exe 1 17->33         started        35 cmd.exe 1 17->35         started        process6 51 3 other processes 19->51 37 conhost.exe 21->37         started        53 2 other processes 23->53 39 conhost.exe 25->39         started        41 conhost.exe 27->41         started        43 conhost.exe 29->43         started        45 conhost.exe 31->45         started        47 conhost.exe 33->47         started        49 conhost.exe 35->49         started        process7 55 conhost.exe 51->55         started        57 conhost.exe 51->57         started        59 conhost.exe 53->59         started        61 conhost.exe 53->61         started       
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-05-09 06:08:16 UTC
AV detection:
31 of 46 (67.39%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:4500 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Unpacked files
SH256 hash:
5f52270bda458df5753459b4694059f8ed43e42b3b90e3b06db406b34fdf994c
MD5 hash:
7b60d8198ace1456871020cdecb71f3b
SHA1 hash:
c84982da6d812405a36f7866ec0948cc2e49c3b9
Detections:
win_isfb_auto
SH256 hash:
4b1ff2f9354e2504464ca3bd74e20ff25aa57084a871e81bada09523fa4327e1
MD5 hash:
95da98c0a63160a3cef05cc23aa28dab
SHA1 hash:
fb58fd8e30bc85378affe40d90fba2f05d721d92
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 4b1ff2f9354e2504464ca3bd74e20ff25aa57084a871e81bada09523fa4327e1

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-09 07:35:53 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
1) [B0012.001] Anti-Static Analysis::Argument Obfuscation
2) [C0026.002] Data Micro-objective::XOR::Encode Data
4) [C0051] File System Micro-objective::Read File
5) [C0052] File System Micro-objective::Writes File
6) [C0007] Memory Micro-objective::Allocate Memory
7) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
8) [C0040] Process Micro-objective::Allocate Thread Local Storage
9) [C0017] Process Micro-objective::Create Process
10) [C0038] Process Micro-objective::Create Thread
11) [C0041] Process Micro-objective::Set Thread Local Storage Value
12) [C0018] Process Micro-objective::Terminate Process