MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 7


Intelligence 7 IOCs YARA 7 File information Comments

SHA256 hash: ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f
SHA3-384 hash: 1d50ed8a2fc0a5fb9a5fa6aba21a76693b07d8bb1fb0f83acb6dd7e773083f2302e5865afecb59d252559b16d89c6368
SHA1 hash: 816db7af62de3dc200b88357a5341c6ce184cc93
MD5 hash: 4dddb0320eac6050d6360c92c104d05c
humanhash: fourteen-tennessee-eighteen-four
File name:Information.xlsb
Download: download sample
Signature Gozi
File size:20'546 bytes
First seen:2020-11-13 10:08:06 UTC
Last seen:2020-11-13 21:20:05 UTC
File type:Excel file xlsx
MIME type:application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
ssdeep 384:tU6Nb0gvQjezRO8RyOmBxE577kanokS2aGc9gPefhFTJRGi:tAgYEerBxEx73noEaGcWPWVJP
TLSH 33928E0D6114D42EC36B68BEC2005AE25D9F71B2E401E25B39997B5D67E72C327CF18E
Reporter FORMALITYDE
Tags:Gozi xlsb

Intelligence


File Origin
# of uploads :
6
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching the default Windows debugger (dwwin.exe)
Launching a process by exploiting the app vulnerability
Result
Verdict:
MALICIOUS
Details
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Result
Threat name:
Hidden Macro 4.0 Ursnif
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Compiles code for process injection (via .Net compiler)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Downloads files with wrong headers with respect to MIME Content-Type
Encrypted powershell cmdline option found
Found abnormal large hidden Excel 4.0 Macro sheet
Found Excel 4.0 Macro with suspicious formulas
Found obfuscated Excel 4.0 Macro
Hooks registry keys query functions (used to hide registry keys)
Injects code into the Windows Explorer (explorer.exe)
Maps a DLL or memory area into another process
Modifies the export address table of user mode modules (user mode EAT hooks)
Modifies the import address table of user mode modules (user mode IAT hooks)
Modifies the prolog of user mode functions (user mode inline hooks)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Office process drops PE file
Sets debug register (to hijack the execution of another thread)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious Csc.exe Source File Folder
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Writes to foreign memory regions
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 315949 Sample: Frachtbrief.xlsb Startdate: 13/11/2020 Architecture: WINDOWS Score: 100 77 Document exploit detected (drops PE files) 2->77 79 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->79 81 Yara detected  Ursnif 2->81 83 13 other signatures 2->83 10 cmd.exe 2->10         started        12 EXCEL.EXE 34 43 2->12         started        17 iexplore.exe 2 99 2->17         started        process3 dnsIp4 19 forfiles.exe 10->19         started        21 conhost.exe 10->21         started        73 45.138.72.84, 49733, 80 MSKHOSTRU Russian Federation 12->73 65 C:\Users\user\AppData\...\10.11nov322[1].gif, PE32 12->65 dropped 67 C:\ProgramData\Dori.ocx, PE32 12->67 dropped 69 C:\Users\user\Desktop\~$Frachtbrief.xlsb, data 12->69 dropped 105 Document exploit detected (process start blacklist hit) 12->105 107 Document exploit detected (UrlDownloadToFile) 12->107 23 regsvr32.exe 12->23         started        26 iexplore.exe 30 17->26         started        29 iexplore.exe 27 17->29         started        31 iexplore.exe 28 17->31         started        33 7 other processes 17->33 file5 signatures6 process7 dnsIp8 35 cmd.exe 19->35         started        38 conhost.exe 19->38         started        87 Injects code into the Windows Explorer (explorer.exe) 23->87 89 Writes to foreign memory regions 23->89 91 Maps a DLL or memory area into another process 23->91 93 2 other signatures 23->93 71 bonderlas.xyz 45.140.147.167, 443, 49741, 49742 SYNLINQsynlinqdeDE United Kingdom 26->71 signatures9 process10 signatures11 85 Encrypted powershell cmdline option found 35->85 40 powershell.exe 35->40         started        process12 file13 61 C:\Users\user\AppData\Local\...\fapasq1b.0.cs, C++ 40->61 dropped 63 C:\Users\user\AppData\...\3gmrnqmj.cmdline, UTF-8 40->63 dropped 95 Injects code into the Windows Explorer (explorer.exe) 40->95 97 Sets debug register (to hijack the execution of another thread) 40->97 99 Writes to foreign memory regions 40->99 101 3 other signatures 40->101 44 explorer.exe 40->44 injected 48 csc.exe 40->48         started        51 csc.exe 40->51         started        signatures14 process15 dnsIp16 75 mngeedon.website 45.140.146.181, 443, 49777, 49778 SYNLINQsynlinqdeDE United Kingdom 44->75 103 System process connects to network (likely due to code injection or exploit) 44->103 57 C:\Users\user\AppData\Local\...\3gmrnqmj.dll, PE32 48->57 dropped 53 cvtres.exe 48->53         started        59 C:\Users\user\AppData\Local\...\fapasq1b.dll, PE32 51->59 dropped 55 cvtres.exe 51->55         started        file17 signatures18 process19
Threat name:
Document-Excel.Trojan.Ursnif
Status:
Malicious
First seen:
2020-11-13 10:09:04 UTC
File Type:
Document
Extracted files:
26
AV detection:
13 of 29 (44.83%)
Threat level:
  5/5
Result
Malware family:
ursnif_rm3
Score:
  10/10
Tags:
family:ursnif_rm3 banker trojan
Behaviour
Delays execution with timeout.exe
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Suspicious behavior: CmdExeWriteProcessMemorySpam
Drops file in System32 directory
Loads dropped DLL
Process spawned unexpected child process
Ursnif RM3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_Quakbot_xlsb_20201021_2
Author:abuse.ch
Description:Detects Quakbot XLS
Rule name:ach_SmokeLoader_xlsb_20201112
Author:abuse.ch
Description:Detects Smoke Loader XLSB
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Gozi

Excel file xlsx ae87b82d817d363b159e072be2e2017dfe0bcf7fd3bc6a7c9dee0ff885eefc5f

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments