MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 adc95420bda0ec4fcf33c410be8f86f185e95b642c0619a4103c4a64dac52cc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: adc95420bda0ec4fcf33c410be8f86f185e95b642c0619a4103c4a64dac52cc6
SHA3-384 hash: bc9c0a3f6f5cb1cec88996ff9fde0d4440f34b30b33fb2541b5af555d71297e7a990d3e8ddb087da5de89656fb6fdc39
SHA1 hash: 3e0769682853d0538845221a2e51df7fb1ba15e7
MD5 hash: 2df646cf624fc096ebf0b19051ac4e93
humanhash: pennsylvania-jupiter-shade-winter
File name:6006bde674be5pdf.dll
Download: download sample
Signature Gozi
File size:149'848 bytes
First seen:2021-01-19 11:12:16 UTC
Last seen:2021-01-19 12:36:21 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 18b3e82c742f954d3c246fed10a1bb59 (1 x Gozi)
ssdeep 1536:b+jYg1zXYxy2GnbqPL1MvkxhhGqjoioQ+mh:HgpXX2UyLqvYhAqMIh
Threatray 229 similar samples on MalwareBazaar
TLSH FFE37DD938BB9451CB57A5366AD90EB785735F33138C1032BF226AFC03871F96AE1582
Reporter JAMESWT_WT
Tags:brt dll Gozi isfb Ursnif

Code Signing Certificate

Organisation:FRVFMPRLNIMAMSUIMT
Issuer:FRVFMPRLNIMAMSUIMT
Algorithm:sha1WithRSA
Valid from:Jan 18 11:37:09 2021 GMT
Valid to:Dec 31 23:59:59 2039 GMT
Serial number: -675FB15FA1756B65B277F2FEC986B20D
Intelligence: 6 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: EAFE1C9E2CD2D33CEB4D7FAF3AE5B5434C75869B93896F8163076CD03B3B9A11
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
348
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Searching for the window
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Found malware configuration
Hooks registry keys query functions (used to hide registry keys)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Suspicious Csc.exe Source File Folder
Suspicious powershell command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 341463 Sample: 6006bde674be5pdf.dll Startdate: 19/01/2021 Architecture: WINDOWS Score: 100 53 8.8.8.8.in-addr.arpa 2->53 55 1.0.0.127.in-addr.arpa 2->55 57 2 other IPs or domains 2->57 61 Found malware configuration 2->61 63 Yara detected  Ursnif 2->63 65 Sigma detected: Dot net compiler compiles file from suspicious location 2->65 67 8 other signatures 2->67 9 mshta.exe 19 2->9         started        12 loaddll32.exe 1 2->12         started        14 iexplore.exe 1 55 2->14         started        16 2 other processes 2->16 signatures3 process4 dnsIp5 77 Suspicious powershell command line found 9->77 19 powershell.exe 9->19         started        79 Writes or reads registry keys via WMI 12->79 81 Writes registry values via WMI 12->81 23 iexplore.exe 31 14->23         started        26 iexplore.exe 29 14->26         started        28 iexplore.exe 29 14->28         started        51 192.168.2.1 unknown unknown 16->51 30 iexplore.exe 35 16->30         started        32 iexplore.exe 31 16->32         started        signatures6 process7 dnsIp8 47 C:\Users\user\AppData\Local\...\q35sbhot.0.cs, UTF-8 19->47 dropped 49 C:\Users\user\AppData\...\cw4ltk3l.cmdline, UTF-8 19->49 dropped 69 Modifies the context of a thread in another process (thread injection) 19->69 71 Maps a DLL or memory area into another process 19->71 73 Compiles code for process injection (via .Net compiler) 19->73 75 Creates a thread in another existing process (thread injection) 19->75 34 csc.exe 19->34         started        37 csc.exe 19->37         started        39 conhost.exe 19->39         started        59 lopppooole.xyz 185.186.244.49, 49734, 49735, 49736 WEBZILLANL Netherlands 23->59 file9 signatures10 process11 file12 43 C:\Users\user\AppData\Local\...\cw4ltk3l.dll, PE32 34->43 dropped 41 cvtres.exe 34->41         started        45 C:\Users\user\AppData\Local\...\q35sbhot.dll, PE32 37->45 dropped process13
Threat name:
Win32.Trojan.Ymacco
Status:
Malicious
First seen:
2021-01-19 11:13:04 UTC
File Type:
PE (Dll)
AV detection:
19 of 29 (65.52%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
5b9bb441d5668feb6875f9e8a62994db19a388abe147de0fd3b78696c35ae6a3
MD5 hash:
5cce33069495c430986aa2d7e97a91ee
SHA1 hash:
33612169c57409cae2ab89a6b16d2809f00db204
Detections:
win_isfb_auto
SH256 hash:
90a3e6aadc8a73df09008824bdc2225656cfd01faa246266f155e4de8db8b533
MD5 hash:
e986548fef3add733eef15783300b9fb
SHA1 hash:
14f75e39198f463aad830f15129b1ef33e7d3584
Detections:
win_isfb_auto
SH256 hash:
adc95420bda0ec4fcf33c410be8f86f185e95b642c0619a4103c4a64dac52cc6
MD5 hash:
2df646cf624fc096ebf0b19051ac4e93
SHA1 hash:
3e0769682853d0538845221a2e51df7fb1ba15e7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ursnif3
Author:kevoreilly
Description:Ursnif Payload
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments