MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4bf6e9d4067cb905631ddf7452ac571c4ed9800c7eb8fc7e51b688e1154f52e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 4bf6e9d4067cb905631ddf7452ac571c4ed9800c7eb8fc7e51b688e1154f52e3
SHA3-384 hash: 2cfa3be04da46dcf8a64b26fbfc15431189be4e34d59870f1b1b405d433b028703afbc4dc7e04518e12aa3a76bcc9803
SHA1 hash: 39a52cbc48be934cf953d4699e8a1ea5ff53a5bf
MD5 hash: 6fdbd25f7a84da80ee9d8577122c3291
humanhash: fish-hydrogen-hotel-ink
File name:6fdbd25f7a84da80ee9d8577122c3291.dll
Download: download sample
Signature Gozi
File size:478'720 bytes
First seen:2021-05-12 10:40:09 UTC
Last seen:2021-05-12 12:00:05 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash a2f0d616525ae6c643810961c7d4fdfe (2 x Gozi)
ssdeep 12288:4Z31u8+a95+CA9lROexg8P7CbxXTTbWA:4Z31P9wr9lROog8W/
Threatray 247 similar samples on MalwareBazaar
TLSH 15A4AC307696C27BD212AC39CD5AE5FA1B057D20EF19248B35C53FAF79312A10B7D229
Reporter abuse_ch
Tags:dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
3
# of downloads :
275
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
76 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 412166 Sample: nT5pUwoJSS.dll Startdate: 12/05/2021 Architecture: WINDOWS Score: 76 67 Found malware configuration 2->67 69 Multi AV Scanner detection for submitted file 2->69 71 Yara detected  Ursnif 2->71 73 Machine Learning detection for sample 2->73 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 2->10         started        13 iexplore.exe 1 53 2->13         started        15 iexplore.exe 1 73 2->15         started        process3 dnsIp4 75 Writes or reads registry keys via WMI 7->75 77 Writes registry values via WMI 7->77 17 rundll32.exe 7->17         started        20 cmd.exe 1 7->20         started        22 rundll32.exe 7->22         started        24 rundll32.exe 7->24         started        39 vip0x08e.ssl.rncdn5.com 10->39 41 vip0x04f.ssl.rncdn5.com 10->41 47 4 other IPs or domains 10->47 26 iexplore.exe 10->26         started        29 iexplore.exe 10->29         started        43 192.168.2.1 unknown unknown 13->43 45 vip0x08e.ssl.rncdn5.com 13->45 49 4 other IPs or domains 13->49 31 iexplore.exe 3 79 13->31         started        33 iexplore.exe 27 13->33         started        35 iexplore.exe 24 15->35         started        signatures5 process6 dnsIp7 65 Writes registry values via WMI 17->65 37 rundll32.exe 20->37         started        51 horunekulo.website 193.239.85.9, 49778, 49779, 80 MERITAPL Romania 26->51 57 7 other IPs or domains 26->57 59 3 other IPs or domains 29->59 53 worunekulo.club 193.239.84.195, 49733, 49734, 49790 MERITAPL Romania 31->53 61 17 other IPs or domains 31->61 55 gmail.com 172.217.168.69, 443, 49773, 49774 GOOGLEUS United States 33->55 63 7 other IPs or domains 35->63 signatures8 process9
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2021-05-12 10:40:20 UTC
AV detection:
10 of 47 (21.28%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:8877 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
outlook.com/login
gmail.com
worunekulo.club
horunekulo.website
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 4bf6e9d4067cb905631ddf7452ac571c4ed9800c7eb8fc7e51b688e1154f52e3

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-12 11:04:24 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0019] Data Micro-objective::Check String
1) [C0052] File System Micro-objective::Writes File
2) [C0007] Memory Micro-objective::Allocate Memory
3) [C0040] Process Micro-objective::Allocate Thread Local Storage
4) [C0041] Process Micro-objective::Set Thread Local Storage Value
5) [C0018] Process Micro-objective::Terminate Process