MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63bee368085136ef7eed0823b6d8fb25ffecfd6f6d9050ee26f782e2b35df9a4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA 2 File information Comments

SHA256 hash: 63bee368085136ef7eed0823b6d8fb25ffecfd6f6d9050ee26f782e2b35df9a4
SHA3-384 hash: 2f2a94dbb294eaa5f88b54921dbce61e3c8094a12a72c9def18e3a569b3776ac3b485cdb848b58192809eb051b62c48e
SHA1 hash: dee5ab23ff6f339fabddbb5b2bedc9d13329682c
MD5 hash: 9fe062a79018b4df322391a8f055d6be
humanhash: summer-arizona-seven-alanine
File name:pan0ramic0.jpg.dll
Download: download sample
Signature Gozi
File size:386'560 bytes
First seen:2021-01-22 10:46:07 UTC
Last seen:2021-01-22 13:07:42 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 9496e157749676d9d25c8f160c0ee11d (1 x Gozi)
ssdeep 6144:jnefiNrbKvEz9rAxpyuwOo440VP3xdKc1w6wxeUosh45bDGruE:zefGbmEz9rAxpyui4DDtK6/UoKcO3
Threatray 117 similar samples on MalwareBazaar
TLSH 0384C01176D0C036E66E61344827DBB507AABC501B7DB9DB37DD1E6F0B322D2AA32385
Reporter JAMESWT_WT
Tags:dll enigaseluce Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
367
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Found malware configuration
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 343140 Sample: pan0ramic0.jpg.dll Startdate: 22/01/2021 Architecture: WINDOWS Score: 64 32 Found malware configuration 2->32 34 Yara detected  Ursnif 2->34 8 loaddll32.exe 1 2->8         started        process3 process4 10 regsvr32.exe 8->10         started        13 cmd.exe 1 8->13         started        signatures5 36 Writes or reads registry keys via WMI 10->36 38 Writes registry values via WMI 10->38 15 iexplore.exe 2 91 13->15         started        process6 process7 17 iexplore.exe 5 144 15->17         started        20 iexplore.exe 25 15->20         started        22 iexplore.exe 29 15->22         started        dnsIp8 24 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49741, 49742 FASTLYUS United States 17->24 26 192.168.2.1 unknown unknown 17->26 30 8 other IPs or domains 17->30 28 ocsp.sca1b.amazontrust.com 143.204.214.141, 49768, 49769, 80 AMAZON-02US United States 20->28
Threat name:
Win32.Worm.Cridex
Status:
Malicious
First seen:
2021-01-22 10:46:51 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
ransomware
Behaviour
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Unpacked files
SH256 hash:
0eb08155d97eee193e147299abc2525e460ba78fa9e253ae086ecbc901fb0816
MD5 hash:
85e1ece69f785c59b6db13cd92af0de1
SHA1 hash:
938a8c6f0a75e8fabce41a914878c83e5ca5fa15
Detections:
win_isfb_auto
SH256 hash:
63bee368085136ef7eed0823b6d8fb25ffecfd6f6d9050ee26f782e2b35df9a4
MD5 hash:
9fe062a79018b4df322391a8f055d6be
SHA1 hash:
dee5ab23ff6f339fabddbb5b2bedc9d13329682c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ursnif3
Author:kevoreilly
Description:Ursnif Payload
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 63bee368085136ef7eed0823b6d8fb25ffecfd6f6d9050ee26f782e2b35df9a4

(this sample)

  
Delivery method
Distributed via web download

Comments