MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 894668791d06262dd16740235faa3b1672e2cb5cf171954f29abaca421c09265. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 894668791d06262dd16740235faa3b1672e2cb5cf171954f29abaca421c09265
SHA3-384 hash: 84e69ff4265482c35ccf8421f86f3d6b89cff804941c1678a95c4cf42df8e8862e40ce07d10e27c5af19ecf8cfde99c1
SHA1 hash: 0f661ba97e702021988fa372fde43bd3165f1cfe
MD5 hash: b565aa423ca4ba6e8c6b208c22e5b056
humanhash: solar-august-high-nineteen
File name:b565aa423ca4ba6e8c6b208c22e5b056.dll
Download: download sample
Signature Gozi
File size:599'040 bytes
First seen:2023-07-04 12:50:01 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash fef75c12870ae749ff204e9c29112359 (2 x Gozi)
ssdeep 6144:2Qs4GPx2zWaTL8pxi5mLgNKz+ODzKaDtdjokutIC54VQQkPBRm2mZOkjnEsWKsGs:Y4sQiMjNa+ODmsWDOWrK1idIGd
Threatray 204 similar samples on MalwareBazaar
TLSH T114D44B47EC419FB7D65D42BACA9E4E4AC2264602FF03BBABF11E8150754325223E738D
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter JAMESWT_WT
Tags:brt dll Gozi isfb ITA Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
324
Origin country :
IT IT
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
bank.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
Changes memory attributes in foreign processes to executable or writable
Creates a thread in another existing process (thread injection)
Disables SPDY (HTTP compression, likely to perform web injects)
Found malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Injects code into the Windows Explorer (explorer.exe)
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to steal Mail credentials (via file / registry access)
Writes or reads registry keys via WMI
Writes registry values via WMI
Writes to foreign memory regions
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1266597 Sample: Cb4h46UGl3.dll Startdate: 04/07/2023 Architecture: WINDOWS Score: 100 117 Snort IDS alert for network traffic 2->117 119 Found malware configuration 2->119 121 Malicious sample detected (through community Yara rule) 2->121 123 5 other signatures 2->123 8 mshta.exe 19 2->8         started        10 loaddll32.exe 7 2->10         started        14 mshta.exe 2->14         started        16 2 other processes 2->16 process3 dnsIp4 18 powershell.exe 8->18         started        113 itwicenice.com 10->113 115 avas1ta.com 10->115 165 Writes to foreign memory regions 10->165 167 Writes or reads registry keys via WMI 10->167 169 Writes registry values via WMI 10->169 22 cmd.exe 1 10->22         started        24 regsvr32.exe 1 6 10->24         started        27 rundll32.exe 6 10->27         started        35 2 other processes 10->35 29 powershell.exe 14->29         started        31 powershell.exe 16->31         started        33 powershell.exe 16->33         started        signatures5 process6 dnsIp7 77 C:\Users\user\AppData\...\z3fufrxj.cmdline, Unicode 18->77 dropped 125 Injects code into the Windows Explorer (explorer.exe) 18->125 127 Writes to foreign memory regions 18->127 129 Modifies the context of a thread in another process (thread injection) 18->129 131 Found suspicious powershell code related to unpacking or dynamic code loading 18->131 37 explorer.exe 18->37 injected 50 3 other processes 18->50 42 rundll32.exe 6 22->42         started        105 itwicenice.com 91.212.166.44, 49699, 49700, 49701 MOBILY-ASEtihadEtisalatCompanyMobilySA United Kingdom 24->105 107 avas1ta.com 24->107 133 Writes or reads registry keys via WMI 24->133 135 Writes registry values via WMI 24->135 44 control.exe 24->44         started        109 avas1ta.com 27->109 46 control.exe 27->46         started        137 Maps a DLL or memory area into another process 29->137 139 Creates a thread in another existing process (thread injection) 29->139 52 3 other processes 29->52 111 192.168.2.1 unknown unknown 31->111 54 3 other processes 31->54 56 3 other processes 33->56 48 rundll32.exe 35->48         started        file8 signatures9 process10 dnsIp11 97 itwicenice.com 37->97 99 avas1t.de 37->99 79 C:\Users\user\AppData\...\UtilDiagram.dll, PE32 37->79 dropped 141 System process connects to network (likely due to code injection or exploit) 37->141 143 Benign windows process drops PE files 37->143 145 Tries to steal Mail credentials (via file / registry access) 37->145 155 4 other signatures 37->155 69 3 other processes 37->69 101 itwicenice.com 42->101 103 avas1ta.com 42->103 147 Writes to foreign memory regions 42->147 149 Allocates memory in foreign processes 42->149 151 Modifies the context of a thread in another process (thread injection) 42->151 153 Writes registry values via WMI 42->153 58 control.exe 42->58         started        61 rundll32.exe 44->61         started        63 rundll32.exe 46->63         started        81 C:\Users\user\AppData\Local\...\z3fufrxj.dll, PE32 50->81 dropped 83 C:\Users\user\AppData\Local\...\bs2w4jve.dll, PE32 50->83 dropped 65 cvtres.exe 50->65         started        67 cvtres.exe 50->67         started        85 C:\Users\user\AppData\Local\...\zxhfxsxp.dll, PE32 52->85 dropped 87 C:\Users\user\AppData\Local\...\oon4suab.dll, PE32 52->87 dropped 71 2 other processes 52->71 89 C:\Users\user\AppData\Local\...\yprgqah3.dll, PE32 54->89 dropped 91 C:\Users\user\AppData\Local\...\oqoh5ngw.dll, PE32 54->91 dropped 73 2 other processes 54->73 93 C:\Users\user\AppData\Local\...\vdq41qhu.dll, PE32 56->93 dropped 95 C:\Users\user\AppData\Local\...\3reu5emh.dll, PE32 56->95 dropped 75 2 other processes 56->75 file12 signatures13 process14 signatures15 157 Writes to foreign memory regions 58->157 159 Allocates memory in foreign processes 58->159 161 Modifies the context of a thread in another process (thread injection) 58->161 163 Maps a DLL or memory area into another process 58->163
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2023-07-04 12:49:31 UTC
File Type:
PE (Dll)
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi botnet:5050 banker isfb persistence trojan
Behaviour
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Gozi
Malware Config
C2 Extraction:
https://avas1ta.com/in/login/
itwicenice.com
https://avas1t.de/in/loginq/
Unpacked files
SH256 hash:
4a905d05461fdf0b0c2523a2dfd334279d80fdb79633e1539d7f16dcb5a5218d
MD5 hash:
2f45c21efbffc3b5e2ddc61c3f94a475
SHA1 hash:
d6474c8d16df4764a4a8756b2cc566c46439f348
SH256 hash:
894668791d06262dd16740235faa3b1672e2cb5cf171954f29abaca421c09265
MD5 hash:
b565aa423ca4ba6e8c6b208c22e5b056
SHA1 hash:
0f661ba97e702021988fa372fde43bd3165f1cfe
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:bumblebee_win_generic
Author:_kphi

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 894668791d06262dd16740235faa3b1672e2cb5cf171954f29abaca421c09265

(this sample)

  
Delivery method
Distributed via web download

Comments