MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b7d73139f8758b04508d6873dd29011ab35b336b73ece0d4ea0710399c960180. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: b7d73139f8758b04508d6873dd29011ab35b336b73ece0d4ea0710399c960180
SHA3-384 hash: dcce82a02c67fcc923049e19b5675607987a5995f640c0f6c1f88d64472215ea63c788c86a6f0e54ab42c65bfd3d59b0
SHA1 hash: af32286f8eaf266d4ee609aca40cad4a2221717b
MD5 hash: fb4868e55a1dc8b84833262ac5ff6254
humanhash: jig-cold-bulldog-freddie
File name:6135e5651eada.tar
Download: download sample
Signature Gozi
File size:376'832 bytes
First seen:2021-09-06 10:12:37 UTC
Last seen:2021-09-06 21:46:53 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 56afa8935a33a8701aa82a9274230e42 (1 x Gozi)
ssdeep 6144:8pW5yM4eF6MOl7SfFPFY0Hi1PkZkWM6gm2X4cCC8rJpDvjM:8Q5yB78fFPTHi1Pku6gjIcC3FlM
Threatray 1'903 similar samples on MalwareBazaar
TLSH T11284E012B7E2E0B0D06E463ABC60DCE55A9C7C616F345897B7C42F9F6A33091563A70B
Reporter ffforward
Tags:Cutwail dll enel EnelEnergia Gozi tar Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'261
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
DNS request
Connection attempt
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
80 / 100
Signature
Found malware configuration
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-09-06 10:13:08 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
13 of 27 (48.15%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:8877 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
outlook.com
lureborufer.store
dureborufer.store
Unpacked files
SH256 hash:
2889137d866cc4c5859a4372fc2e1de6a3c8e299839b20a6ea9aa9da2eac9195
MD5 hash:
2702857c552e001a49ea1b0e1604fc9e
SHA1 hash:
34bcd9532ccc4035e30a8d2be5e5a009b1fd0cf5
Detections:
win_isfb_auto
SH256 hash:
b7d73139f8758b04508d6873dd29011ab35b336b73ece0d4ea0710399c960180
MD5 hash:
fb4868e55a1dc8b84833262ac5ff6254
SHA1 hash:
af32286f8eaf266d4ee609aca40cad4a2221717b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Gozi

DLL dll b7d73139f8758b04508d6873dd29011ab35b336b73ece0d4ea0710399c960180

(this sample)

Comments