MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 56a0cec492d2f8d68f8c9c5f54a9c9407f352e3b33e1e3e6c68409acb0ec04ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 56a0cec492d2f8d68f8c9c5f54a9c9407f352e3b33e1e3e6c68409acb0ec04ac
SHA3-384 hash: 859ad07a34a3d9ade9afbb75f5f9c835198366f3363bcc13f2c75ea8b4d31bb4ce2e482c08110fee7463902da5a7ed6f
SHA1 hash: 66692ff392d5844b8bc362cb8a2640927cea6fbf
MD5 hash: f77e7bd43f365593014469cf644ced65
humanhash: montana-purple-mexico-beer
File name:SecuriteInfo.com.Generic.mg.f77e7bd43f365593.8235
Download: download sample
Signature Gozi
File size:360'448 bytes
First seen:2021-02-15 23:56:19 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e0e710d4ed87ec11636d345dba071187 (5 x Gozi)
ssdeep 6144:g87Sm49lFRQSAe5klIQm3n/ym1grjpY7nf9Bv3lYdkv+hgG2gnG4V/gU:Im+3QSAdm3n/yogZgbv3Gqv0gG2gG4lv
Threatray 126 similar samples on MalwareBazaar
TLSH 5474CF01B296C871F0C91139D011D67A96763C057BBA94D3BFE61D8FAA2B1D26F3A343
Reporter SecuriteInfoCom
Tags:Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
202
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Searching for the window
Sending an HTTP GET request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Found malware configuration
Hooks registry keys query functions (used to hide registry keys)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: MSHTA Spawning Windows Shell
Suspicious powershell command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 353282 Sample: SecuriteInfo.com.Generic.mg... Startdate: 16/02/2021 Architecture: WINDOWS Score: 100 46 c56.lepini.at 2->46 48 resolver1.opendns.com 2->48 50 api3.lepini.at 2->50 60 Multi AV Scanner detection for domain / URL 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 9 other signatures 2->66 9 mshta.exe 1 2->9         started        12 loaddll32.exe 1 2->12         started        signatures3 process4 signatures5 68 Suspicious powershell command line found 9->68 14 powershell.exe 9->14         started        18 regsvr32.exe 12->18         started        20 cmd.exe 1 12->20         started        process6 file7 42 C:\Users\user\AppData\Local\...\vnsaj2px.0.cs, UTF-8 14->42 dropped 44 C:\Users\user\AppData\...\q4v3w255.cmdline, UTF-8 14->44 dropped 70 Modifies the context of a thread in another process (thread injection) 14->70 72 Maps a DLL or memory area into another process 14->72 74 Compiles code for process injection (via .Net compiler) 14->74 76 Creates a thread in another existing process (thread injection) 14->76 22 csc.exe 14->22         started        25 conhost.exe 14->25         started        78 Writes or reads registry keys via WMI 18->78 80 Writes registry values via WMI 18->80 27 iexplore.exe 1 84 20->27         started        signatures8 process9 file10 40 C:\Users\user\AppData\Local\...\q4v3w255.dll, PE32 22->40 dropped 29 cvtres.exe 22->29         started        31 iexplore.exe 151 27->31         started        34 iexplore.exe 29 27->34         started        36 iexplore.exe 29 27->36         started        38 iexplore.exe 29 27->38         started        process11 dnsIp12 52 img.img-taboola.com 31->52 54 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49742, 49743 FASTLYUS United States 31->54 58 8 other IPs or domains 31->58 56 api10.laptok.at 34.65.144.159, 49757, 49758, 49759 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 34->56
Threat name:
Win32.Worm.Cridex
Status:
Malicious
First seen:
2021-02-15 20:55:59 UTC
AV detection:
8 of 29 (27.59%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:1100 banker trojan
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
Unpacked files
SH256 hash:
56a0cec492d2f8d68f8c9c5f54a9c9407f352e3b33e1e3e6c68409acb0ec04ac
MD5 hash:
f77e7bd43f365593014469cf644ced65
SHA1 hash:
66692ff392d5844b8bc362cb8a2640927cea6fbf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ursnif3
Author:kevoreilly
Description:Ursnif Payload
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 56a0cec492d2f8d68f8c9c5f54a9c9407f352e3b33e1e3e6c68409acb0ec04ac

(this sample)

  
Delivery method
Distributed via web download

Comments