MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4eae1c5ebdb7b2021913b37477077bde0177579b6f8d43a49bd8a202b45657f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: 4eae1c5ebdb7b2021913b37477077bde0177579b6f8d43a49bd8a202b45657f4
SHA3-384 hash: 60047992fdb625a192e735921bceb98b9dc6c35cf2ff03022720bfb3960c316effdbe2fe6d1adef9a69e8b0d5f6b23a3
SHA1 hash: 368859c657c58874ab97167396feaa729304f881
MD5 hash: e5c6442649340b5a0778902ecfbe0cec
humanhash: blue-blue-salami-ohio
File name:e5c6442649340b5a0778902ecfbe0cec.dll
Download: download sample
Signature Gozi
File size:359'424 bytes
First seen:2022-02-10 07:37:15 UTC
Last seen:2022-02-10 10:25:25 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 1c859fc09e7dd8ae36985c58f1251eab (3 x Gozi)
ssdeep 6144:JIWzRNtkJNxiPsnYaiz4fwE5tTuGYyb8Zuv1DvVOuETHwekZ1M3b2:3zR3TP6Ybz4fxLTbWYjsQecn
Threatray 437 similar samples on MalwareBazaar
TLSH T14274F8BA8700C531F0BA647DA224F1A95C1F4771368884BFF261ACD495769E8CE39F1B
Reporter abuse_ch
Tags:agenziaentrate dll geo Gozi isfb ITA Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Network Activity
Sigma detected: Suspicious Call by Ordinal
Sigma detected: Suspicious Remote Thread Created
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 569901 Sample: 7AYjl15IPR.dll Startdate: 10/02/2022 Architecture: WINDOWS Score: 100 50 linkspremium.ru 2->50 78 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->78 80 Multi AV Scanner detection for domain / URL 2->80 82 Found malware configuration 2->82 84 7 other signatures 2->84 8 loaddll32.exe 7 2->8         started        12 iexplore.exe 1 58 2->12         started        14 iexplore.exe 2->14         started        16 2 other processes 2->16 signatures3 process4 dnsIp5 76 interlines.space 8->76 96 Writes or reads registry keys via WMI 8->96 98 Writes registry values via WMI 8->98 18 regsvr32.exe 6 8->18         started        22 cmd.exe 1 8->22         started        24 rundll32.exe 6 8->24         started        32 2 other processes 8->32 26 iexplore.exe 36 12->26         started        28 iexplore.exe 31 12->28         started        30 iexplore.exe 12->30         started        34 3 other processes 14->34 36 3 other processes 16->36 signatures6 process7 dnsIp8 52 interlines.space 18->52 86 System process connects to network (likely due to code injection or exploit) 18->86 88 Writes or reads registry keys via WMI 18->88 90 Writes registry values via WMI 18->90 38 rundll32.exe 6 22->38         started        54 interlines.space 24->54 56 192.168.2.1 unknown unknown 26->56 42 iexplore.exe 26->42         started        44 iexplore.exe 26->44         started        46 iexplore.exe 26->46         started        48 iexplore.exe 26->48         started        58 interlines.top 31.41.46.120, 49751, 49752, 49755 ASRELINKRU Russian Federation 28->58 60 linkspremium.ru 31.41.44.3, 80 ASRELINKRU Russian Federation 34->60 62 premiumlists.ru 45.128.184.132, 49819, 49820, 49821 MGNHOST-ASRU Russian Federation 36->62 signatures9 process10 dnsIp11 64 linkspremium.ru 38->64 66 interlines.space 38->66 92 System process connects to network (likely due to code injection or exploit) 38->92 94 Writes registry values via WMI 38->94 68 interlines.top 42->68 70 interlines.top 44->70 72 interlines.top 46->72 74 interlines.top 48->74 signatures12
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2022-02-10 07:38:11 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
20 of 27 (74.07%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:7613 banker trojan
Behaviour
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
interlines.top
interlines.space
linkspremium.ru
premiumlists.ru
Unpacked files
SH256 hash:
e6f3b5857a2da506a0f5470400655fc4011600ae4253bba3dae85f7e6a9be6c2
MD5 hash:
21e836bd521081f8b97c3e5a31822afe
SHA1 hash:
fec35c2a1f2d362356573b25f0dd4a50c7be842e
Detections:
win_isfb_auto
SH256 hash:
831619fb5a9b21c3cd073a901e05a1a94be2f1db95a71751a4c54d6061d9c117
MD5 hash:
67eb78fba57178ed8a19f1cacb04538d
SHA1 hash:
39bdd27dc35920567861066e286e6f3b1928f07d
Detections:
win_isfb_auto
SH256 hash:
4eae1c5ebdb7b2021913b37477077bde0177579b6f8d43a49bd8a202b45657f4
MD5 hash:
e5c6442649340b5a0778902ecfbe0cec
SHA1 hash:
368859c657c58874ab97167396feaa729304f881
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 4eae1c5ebdb7b2021913b37477077bde0177579b6f8d43a49bd8a202b45657f4

(this sample)

Comments