MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9982fdf2c1b5b3c8e15cffe317da900d764d65d7d09cf98b0e52cfcc966898c3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 9982fdf2c1b5b3c8e15cffe317da900d764d65d7d09cf98b0e52cfcc966898c3
SHA3-384 hash: 0f06321f998aeedbb42c8526773c28476d6a61ef2081f7f5e8188553213f9d2ae28ec116ed45191ab7f6ee4792e6df9a
SHA1 hash: d7941a5e940c8f549252ec96a75359c2273337cc
MD5 hash: 3e28814e19eaf2699c28a2afe25b55ee
humanhash: bulldog-washington-quiet-wyoming
File name:3e28814e19eaf2699c28a2afe25b55ee.exe
Download: download sample
Signature Gozi
File size:454'936 bytes
First seen:2022-02-24 08:58:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1c04dffba09707f083fbfc83a7f90758 (1 x Gozi)
ssdeep 12288:JVRknbEsfVRknbbQi9VRknbQVRknbWVRknbAj0LhL9+:JVibVVibbvVibQVibWVibAj0LNM
Threatray 419 similar samples on MalwareBazaar
TLSH T13AA4D0B726AEB47BD6CBA53F32382AB80840CD11D6ABA2D366C75BDDC46DFD34404941
Reporter abuse_ch
Tags:exe geo Gozi isfb ITA Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
324
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Using the Windows Management Instrumentation requests
Launching a process
Searching for synchronization primitives
Сreating synchronization primitives
Creating a window
DNS request
Sending an HTTP GET request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Regsvr32 Network Activity
Sigma detected: Suspicious Call by Ordinal
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 578107 Sample: o2I1q5eBz2.exe Startdate: 24/02/2022 Architecture: WINDOWS Score: 100 59 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->59 61 Multi AV Scanner detection for domain / URL 2->61 63 Found malware configuration 2->63 65 6 other signatures 2->65 7 loaddll32.exe 7 2->7         started        11 iexplore.exe 2->11         started        13 iexplore.exe 2->13         started        15 2 other processes 2->15 process3 dnsIp4 57 premiumlists.ru 7->57 75 Found evasive API chain (may stop execution after checking system information) 7->75 77 Found API chain indicative of debugger detection 7->77 79 Writes or reads registry keys via WMI 7->79 81 Writes registry values via WMI 7->81 17 regsvr32.exe 6 7->17         started        21 cmd.exe 1 7->21         started        23 rundll32.exe 6 7->23         started        31 4 other processes 11->31 33 4 other processes 13->33 25 iexplore.exe 31 15->25         started        27 iexplore.exe 33 15->27         started        29 iexplore.exe 30 15->29         started        35 3 other processes 15->35 signatures5 process6 dnsIp7 67 System process connects to network (likely due to code injection or exploit) 17->67 69 Writes or reads registry keys via WMI 17->69 71 Writes registry values via WMI 17->71 37 rundll32.exe 6 21->37         started        41 linkspremium.ru 62.173.149.135, 49761, 49762, 49763 SPACENET-ASInternetServiceProviderRU Russian Federation 25->41 43 atomlinks.top 25->43 45 atomlinks.top 27->45 51 2 other IPs or domains 29->51 47 31.41.46.120, 49824, 49825, 49832 ASRELINKRU Russian Federation 31->47 53 4 other IPs or domains 31->53 49 premiumlists.ru 45.128.184.132, 80 MGNHOST-ASRU Russian Federation 35->49 signatures8 process9 dnsIp10 55 premiumlists.ru 37->55 73 Writes registry values via WMI 37->73 signatures11
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2022-02-24 03:27:00 UTC
File Type:
PE (Dll)
AV detection:
19 of 43 (44.19%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:7617 banker trojan
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
atomlinks.top
linkspremium.ru
premiumlists.ru
Unpacked files
SH256 hash:
e0d1b5b5d8b77a5868fff21a85366d732345ca37c9f6fe6e96c9b4fbd92fe579
MD5 hash:
99c3d2a630f117bf42973d0d0516e967
SHA1 hash:
ff4abbce71fd70a2791f1ac96ab94aaa11eb5382
Detections:
win_isfb_auto
SH256 hash:
16057acd8a0dbf3ef560588781a388048fa89fd1b027f9d925286fd3f92d6f05
MD5 hash:
c3e7b109e08101f52525d9e90f797c52
SHA1 hash:
0dd271130dcd21ddb4fe6871870e2ebe81539820
Detections:
win_isfb_auto
SH256 hash:
9982fdf2c1b5b3c8e15cffe317da900d764d65d7d09cf98b0e52cfcc966898c3
MD5 hash:
3e28814e19eaf2699c28a2afe25b55ee
SHA1 hash:
d7941a5e940c8f549252ec96a75359c2273337cc
Malware family:
Ursnif.Dreambot.D
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

Executable exe 9982fdf2c1b5b3c8e15cffe317da900d764d65d7d09cf98b0e52cfcc966898c3

(this sample)

  
Delivery method
Distributed via web download

Comments