MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae55975bd40147ab3b9a02f1e2e0279f714bce9845d26ace252cd590a42d733d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: ae55975bd40147ab3b9a02f1e2e0279f714bce9845d26ace252cd590a42d733d
SHA3-384 hash: 964a0869e6583f6f7290c88866468618823d23d5d5ab326262733fcbd22c983de7d2542b8b2b0b8b99912d651c1c197b
SHA1 hash: 5a5c60b32770cb4654269a812d07e13767ad7ed6
MD5 hash: 913c77883aa2e28ec98e5cf86d6fc2cb
humanhash: autumn-uranus-hotel-minnesota
File name:913c77883aa2e28ec98e5cf86d6fc2cb.dll
Download: download sample
Signature Gozi
File size:95'744 bytes
First seen:2021-02-12 08:57:58 UTC
Last seen:2021-02-12 18:43:27 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash d271f7a9f51a46084a356053f9d55873 (1 x Gozi)
ssdeep 1536:Hp8F8N2PU39eB+thp5sgHp6qeIyHCsousUotPPlByJbo3:Hp8RPUt73pjQ+YoHtPtB
Threatray 254 similar samples on MalwareBazaar
TLSH FD936B80B9FDCC82DF981BF44AF458BD721AB4A41F33249E569679E86DF31136A1D830
Reporter abuse_ch
Tags:dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
313
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Searching for the window
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Gozi Ursnif
Detection:
malicious
Classification:
bank.troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Compiles code for process injection (via .Net compiler)
Creates a thread in another existing process (thread injection)
Detected Gozi e-Banking trojan
Found malware configuration
Hooks registry keys query functions (used to hide registry keys)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: MSHTA Spawning Windows Shell
Suspicious powershell command line found
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 352339 Sample: u8xtCk7fq8.dll Startdate: 12/02/2021 Architecture: WINDOWS Score: 100 60 c56.lepini.at 2->60 62 resolver1.opendns.com 2->62 64 api3.lepini.at 2->64 92 Multi AV Scanner detection for domain / URL 2->92 94 Found malware configuration 2->94 96 Malicious sample detected (through community Yara rule) 2->96 98 11 other signatures 2->98 9 loaddll32.exe 2 1 2->9         started        12 mshta.exe 2->12         started        14 mshta.exe 2->14         started        16 2 other processes 2->16 signatures3 process4 signatures5 100 Detected Gozi e-Banking trojan 9->100 102 Writes or reads registry keys via WMI 9->102 104 Writes registry values via WMI 9->104 18 rundll32.exe 9->18         started        106 Suspicious powershell command line found 12->106 21 powershell.exe 12->21         started        24 powershell.exe 14->24         started        26 iexplore.exe 30 16->26         started        29 iexplore.exe 30 16->29         started        31 iexplore.exe 30 16->31         started        33 3 other processes 16->33 process6 dnsIp7 80 Detected Gozi e-Banking trojan 18->80 82 Writes registry values via WMI 18->82 56 C:\Users\user\AppData\...\cuuygyc1.cmdline, UTF-8 21->56 dropped 84 Modifies the context of a thread in another process (thread injection) 21->84 86 Maps a DLL or memory area into another process 21->86 88 Compiles code for process injection (via .Net compiler) 21->88 35 csc.exe 21->35         started        38 csc.exe 21->38         started        40 conhost.exe 21->40         started        58 C:\Users\user\AppData\Local\...\51oepeny.0.cs, UTF-8 24->58 dropped 90 Creates a thread in another existing process (thread injection) 24->90 42 csc.exe 24->42         started        44 conhost.exe 24->44         started        66 api10.laptok.at 35.228.31.40, 49742, 49743, 49754 GOOGLEUS United States 26->66 68 golang.feel500.at 29->68 70 192.168.2.1 unknown unknown 31->70 72 go.in100k.at 31->72 74 golang.feel500.at 33->74 76 golang.feel500.at 33->76 78 go.in100k.at 33->78 file8 signatures9 process10 file11 50 C:\Users\user\AppData\Local\...\cuuygyc1.dll, PE32 35->50 dropped 46 cvtres.exe 35->46         started        52 C:\Users\user\AppData\Local\...\4puomjgc.dll, PE32 38->52 dropped 54 C:\Users\user\AppData\Local\...\lojdfmf3.dll, PE32 42->54 dropped 48 cvtres.exe 42->48         started        process12
Threat name:
Win32.Infostealer.Gozi
Status:
Malicious
First seen:
2021-02-12 02:41:46 UTC
File Type:
PE (Dll)
Extracted files:
3
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:3300 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
api10.laptok.at/api1
golang.feel500.at/api1
go.in100k.at/api1
Unpacked files
SH256 hash:
0737bba38b332543dbc630ac460fb8e2e7003bfb51a930827f5b6f54985ebe05
MD5 hash:
9c38a1631e92f9f6467771bc90b4b40b
SHA1 hash:
6a6d15710d322019c4d808e406fc004fa542db9a
Detections:
win_isfb_auto
SH256 hash:
ae55975bd40147ab3b9a02f1e2e0279f714bce9845d26ace252cd590a42d733d
MD5 hash:
913c77883aa2e28ec98e5cf86d6fc2cb
SHA1 hash:
5a5c60b32770cb4654269a812d07e13767ad7ed6
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll ae55975bd40147ab3b9a02f1e2e0279f714bce9845d26ace252cd590a42d733d

(this sample)

  
Delivery method
Distributed via web download

Comments