MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 57caca34e3b88b43872e32534bccf5292b7c8f8b7569fcae8f49a20a422cf600. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 57caca34e3b88b43872e32534bccf5292b7c8f8b7569fcae8f49a20a422cf600
SHA3-384 hash: 7dcbe21f6aa62577d8da8547e4aa5fce61842c576e958c94bdfe5e029e8858a8f684fa857cf81711f5bcce3a4f974d79
SHA1 hash: 4421a5d300681e56ec9e99fc2f63f36ab98597be
MD5 hash: 504cd296b179deb18a2d776cbbad53c4
humanhash: virginia-moon-butter-winner
File name:d2c0000.dll
Download: download sample
Signature Gozi
File size:262'144 bytes
First seen:2022-03-29 12:38:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 6144:1jOc9lLYJm9qCR8h2O1CCP1GzzBpbf7KWtM55QKMu:139VYJj0g2eCCP1GzzT7KWt6
Threatray 30 similar samples on MalwareBazaar
TLSH T16D446D5AA3E50995E9BBC5B9CD93D21BE7F234091A64D34F53B4CE966F03322B21C342
Reporter 0x746f6d6669
Tags:exe Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
392
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Found malware configuration
Sigma detected: Suspicious Call by Ordinal
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 599183 Sample: d2c0000.dll Startdate: 29/03/2022 Architecture: WINDOWS Score: 68 15 Found malware configuration 2->15 17 Antivirus / Scanner detection for submitted sample 2->17 19 Yara detected  Ursnif 2->19 21 Sigma detected: Suspicious Call by Ordinal 2->21 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        process5 13 rundll32.exe 9->13         started       
Threat name:
Win64.Trojan.Ursnif
Status:
Malicious
First seen:
2022-03-29 12:39:07 UTC
File Type:
PE+ (Dll)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:3000
Malware Config
C2 Extraction:
config.edge.skype.com
194.76.226.200
giporedtrip.at
habpfans.at
31.214.157.187
Unpacked files
SH256 hash:
57caca34e3b88b43872e32534bccf5292b7c8f8b7569fcae8f49a20a422cf600
MD5 hash:
504cd296b179deb18a2d776cbbad53c4
SHA1 hash:
4421a5d300681e56ec9e99fc2f63f36ab98597be
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments