MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b83ff3af3645baf703075ecce628742d87f3349f08516d5affb105962b4fd6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: 9b83ff3af3645baf703075ecce628742d87f3349f08516d5affb105962b4fd6b
SHA3-384 hash: 68ca544f1963f5192ac2e473a574c7ad7c79ec438d21390a788e64d1000af896f7140df953c373b7cb820edbd7318432
SHA1 hash: 9dfe540a1668c3227f9e1ee6e801ef7f2827e381
MD5 hash: 2ec1864a1be9b496a148d2e99a3e67c4
humanhash: sad-pizza-johnny-high
File name:2ec1864a_by_Libranalysis
Download: download sample
Signature Gozi
File size:315'392 bytes
First seen:2021-05-19 15:08:34 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash f8aabbe6a394cd22acb165d00a6c2abe (2 x Gozi)
ssdeep 6144:NwOFFl5Z7DI1arQ/hie3xJxHMuC6CvtOL0Sd2k:NtLlrDIwQ/LMuCvtyp4
Threatray 311 similar samples on MalwareBazaar
TLSH F164AD207AD2F171E0B116714E85EAF50728BC169F660A1737E01FDF9E7D6D21E22B22
Reporter Libranalysis
Tags:Gozi Ursnif


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 417476 Sample: 2ec1864a_by_Libranalysis Startdate: 19/05/2021 Architecture: WINDOWS Score: 64 19 Found malware configuration 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Yara detected  Ursnif 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        process5 17 rundll32.exe 9->17         started       
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2021-05-19 15:09:09 UTC
AV detection:
16 of 47 (34.04%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:3500 banker trojan
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
app.buboleinov.com
chat.veminiare.com
chat.billionady.com
app3.maintorna.com
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-19 16:02:51 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
1) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
2) [C0052] File System Micro-objective::Writes File
3) [C0007] Memory Micro-objective::Allocate Memory
4) [C0040] Process Micro-objective::Allocate Thread Local Storage
5) [C0043] Process Micro-objective::Check Mutex
6) [C0041] Process Micro-objective::Set Thread Local Storage Value
7) [C0018] Process Micro-objective::Terminate Process