MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d04f52af134980eef9544350ee216457910e7531a60c88ec9fa80daae59c2d3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA 1 File information Comments

SHA256 hash: 7d04f52af134980eef9544350ee216457910e7531a60c88ec9fa80daae59c2d3
SHA3-384 hash: 81037868c49145911e66a3450cce8bd7afa19f33a9324a19350fd60ea83cb75e179aeb425a9ea30bb577acf64025f1ae
SHA1 hash: f748050e061bb407d06a38009b7669783a1e0936
MD5 hash: 381a9e7c191245cc7e014e19a2c19442
humanhash: william-purple-triple-mobile
File name:Invoice_7892_18Oct.html
Download: download sample
Signature Gozi
File size:502'920 bytes
First seen:2022-10-18 19:41:45 UTC
Last seen:Never
File type: html
MIME type:text/html
ssdeep 12288:LTOYDDKFueroOrlZRrv6oY2JRYhkP4Ih5m:LLKkeFSB2JRLP4I3m
TLSH T1B6B412325BC52FBADBAC5E1540F927198FB01B0FA506588AFF633D41EBFA604410B5DA
Reporter k3dg3___
Tags:5000 Gozi html pw 758493 Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
325
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
75%
Tags:
qbot
Result
Verdict:
UNKNOWN
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Found stalling execution ending in API Sleep call
HTML document with suspicious name
HTML document with suspicious title
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Uses 7zip to decompress a password protected archive
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 725636 Sample: Invoice_7892_18Oct.html Startdate: 18/10/2022 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Yara detected  Ursnif 2->58 60 2 other signatures 2->60 8 chrome.exe 18 8 2->8         started        11 chrome.exe 2->11         started        process3 dnsIp4 46 192.168.2.1 unknown unknown 8->46 48 239.255.255.250 unknown Reserved 8->48 13 unarchiver.exe 5 8->13         started        16 chrome.exe 8->16         started        process5 dnsIp6 70 Uses 7zip to decompress a password protected archive 13->70 19 cmd.exe 2 13->19         started        22 cmd.exe 1 13->22         started        24 7za.exe 2 13->24         started        40 www.google.com 142.250.203.100, 443, 49712, 49738 GOOGLEUS United States 16->40 42 accounts.google.com 142.250.203.109, 443, 49704, 49707 GOOGLEUS United States 16->42 44 3 other IPs or domains 16->44 signatures7 process8 file9 38 C:\Users\user\AppData\Local\Temp\xxl.exe, PE32 19->38 dropped 26 xxl.exe 6 19->26         started        30 conhost.exe 1 19->30         started        32 powershell.exe 36 22->32         started        34 conhost.exe 22->34         started        36 conhost.exe 24->36         started        process10 dnsIp11 50 onlinetwork.top 31.41.44.194, 49740, 49744, 80 ASRELINKRU Russian Federation 26->50 52 linetwork.top 62.173.145.183, 49741, 49746, 80 SPACENET-ASInternetServiceProviderRU Russian Federation 26->52 62 Found evasive API chain (may stop execution after checking system information) 26->62 64 Found stalling execution ending in API Sleep call 26->64 66 Found API chain indicative of debugger detection 26->66 68 2 other signatures 26->68 signatures12
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Gozi

html 7d04f52af134980eef9544350ee216457910e7531a60c88ec9fa80daae59c2d3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments