MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bce0ea4a85e5bc6af2dfe91b1ceef3416f210aa4f5c9cf8e6adf1b7f4aacf874. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: bce0ea4a85e5bc6af2dfe91b1ceef3416f210aa4f5c9cf8e6adf1b7f4aacf874
SHA3-384 hash: 84b50df75e19fab17d032e6c7e3cb2395d3e3932095030a19d183f02461744e495cb3d28ab6ea49e847f1020c65f0a95
SHA1 hash: 83887ebf7e43dd55ac2964d4db2e1ac6107cede3
MD5 hash: 743bf0cc1becee9274e66f108753c23a
humanhash: florida-november-nitrogen-robin
File name:1efaace0000.dll
Download: download sample
Signature Gozi
File size:262'144 bytes
First seen:2022-03-15 14:59:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 6144:3jOc9lLYJm9qCR8h2O1CCP1GzzBpbf76mWtM55jKMu:339VYJj0g2eCCP1GzzT7BWt3
Threatray 25 similar samples on MalwareBazaar
TLSH T165447D5AA3E50D95E9BBC5B9CD93D217DBF234091A60D34F52B4CE9A6F03722B21C342
Reporter 0x746f6d6669
Tags:exe Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
262
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1efaace0000.dll
Verdict:
No threats detected
Analysis date:
2022-03-16 04:54:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed setupapi.dll shell32.dll ursnif
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 589631 Sample: 1efaace0000.dll Startdate: 15/03/2022 Architecture: WINDOWS Score: 76 15 Found malware configuration 2->15 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 2 other signatures 2->21 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        process5 13 rundll32.exe 9->13         started       
Threat name:
Win64.Trojan.Ursnif
Status:
Malicious
First seen:
2022-03-15 15:19:56 UTC
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:777999
Malware Config
C2 Extraction:
config.edge.skype.com
67.43.234.14
67.43.234.37
67.43.234.47
Unpacked files
SH256 hash:
bce0ea4a85e5bc6af2dfe91b1ceef3416f210aa4f5c9cf8e6adf1b7f4aacf874
MD5 hash:
743bf0cc1becee9274e66f108753c23a
SHA1 hash:
83887ebf7e43dd55ac2964d4db2e1ac6107cede3
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments