MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63b506c0917d35cbf539bad3ad26d82ea3edbe50ba3f09f6e39a03c969fa8cfd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 63b506c0917d35cbf539bad3ad26d82ea3edbe50ba3f09f6e39a03c969fa8cfd
SHA3-384 hash: 9c1cea85f6a89397f2f8f8f4ec34cd422e32148316c5b185e0b9f0c835e074c977b24764122a6ef6a49edfd215befa6c
SHA1 hash: ca89ca05ee36b580f713b1e17bb4694506069622
MD5 hash: 7b70469bba9d761d9b90c49c596575d6
humanhash: alanine-table-ten-fruit
File name:communicalink.ps1
Download: download sample
Signature Gozi
File size:172 bytes
First seen:2023-10-05 21:26:28 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 3:SnfM6mqeXAwLXHPtwrWFFdAFEeIAYRmdKI5MuK6R6IBSMeFy1MFIwporFn:ef8qNWmFvGwII5MIR6I91MFIsoRn
Threatray 10 similar samples on MalwareBazaar
TLSH T1A3C0C00E3B18BF7080B09746D91BD44EFC5618E00C0BB104229C08080E04851D7DCD43
Reporter JAMESWT_WT
Tags:agenziaentrate Gozi ps1 Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
234
Origin country :
IT IT
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Details
Malicious Scriptlet 2 of 7
Detected a malicious pivot typically seen during the 'file-less' pivot commonly seen in malware carriers.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to modify clipboard data
Powershell drops PE file
Behaviour
Behavior Graph:
Threat name:
Text.Dropper.PShell
Status:
Malicious
First seen:
2023-10-05 21:27:05 UTC
File Type:
Text (PowerShell)
AV detection:
3 of 23 (13.04%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Executes dropped EXE
Blocklisted process makes network request
Downloads MZ/PE file
Malware Config
Dropper Extraction:
http://communicalink.com/putty.exe
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments