MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9489b404fde84f919122108ec0b56fd7376dbbc706a5733aa5e2dc3aeb005034. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments

SHA256 hash: 9489b404fde84f919122108ec0b56fd7376dbbc706a5733aa5e2dc3aeb005034
SHA3-384 hash: 2c9d9c716681f83c524a1c447300f5849afd6d47c571d594939d09928d36181387ccbeb5eac11850f81d3e3e2d1524c0
SHA1 hash: a544d243cd894f6b320df866c8d1de2da7cbb57e
MD5 hash: 383f57d9665b8533771ea9d033d16080
humanhash: iowa-timing-social-cup
File name:383f57d9665b8533771ea9d033d16080.dll
Download: download sample
Signature Gozi
File size:478'720 bytes
First seen:2021-10-26 14:06:23 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash ac25f5a88b067ef166efd1cbfb31ef12 (3 x Gozi)
ssdeep 6144:V/L436NJ3cuwUO38PRLOWIs4fuHflXX8V1eJdf6h0GrjqI8E14:Z4368LF38ZqseSXSedCfoEK
TLSH T1E5A4CF1331F90074E1BB53794065A5819AEDBF52A73ACDDB62C8216C82BBDC1AB3D713
Reporter abuse_ch
Tags:dll geo Gozi isfb ITA Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
805
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Found malware configuration
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-10-26 14:07:05 UTC
AV detection:
9 of 28 (32.14%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:8899 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
msn.com/mail
realitystorys.com
outlook.com/signup
gderrrpololo.net
Unpacked files
SH256 hash:
da2f3ab48fdf604b7a522c40a289802b1f9630d44d02eb88ab8fe5bb85e0f36f
MD5 hash:
7a9c2077f50f4d8b9cfba234ded6a852
SHA1 hash:
acaeb71bf4eee3fc1548c8f8ce40737ec6c1beef
Detections:
win_isfb_auto
SH256 hash:
9489b404fde84f919122108ec0b56fd7376dbbc706a5733aa5e2dc3aeb005034
MD5 hash:
383f57d9665b8533771ea9d033d16080
SHA1 hash:
a544d243cd894f6b320df866c8d1de2da7cbb57e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll 9489b404fde84f919122108ec0b56fd7376dbbc706a5733aa5e2dc3aeb005034

(this sample)

  
Delivery method
Distributed via web download

Comments