MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c521dd937ce9b2e8bda2fa915bae5b5be0e150a8b82e3b2bfb1cdbc60a8326c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: c521dd937ce9b2e8bda2fa915bae5b5be0e150a8b82e3b2bfb1cdbc60a8326c4
SHA3-384 hash: cce450e0a1209e9ee5cd8f9d11853bc37323c56a0d48439a67be6363c9fc1e09094fb6e02f7862721f6da0ee0241ef6c
SHA1 hash: 0abb60d37fac49912172c5385ff58e049520eb53
MD5 hash: fceb6a51be4205d11be1491f6e263cae
humanhash: ink-maine-magazine-monkey
File name:5.dll
Download: download sample
Signature Gozi
File size:227'342 bytes
First seen:2021-07-07 08:40:12 UTC
Last seen:2021-07-09 13:22:03 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash ea5307b4a63215686c0cdc83cff5fcba (1 x Gozi)
ssdeep 3072:Ndmt0uTpBxy1mXhKvuE3GThWccntEvAJjHPLpvLHMwsJyV/vl5PX8J/g9vN:N85ykhKWE3UhwmMjjpvjMwskD5f8JsvN
Threatray 436 similar samples on MalwareBazaar
TLSH 142412DAEBA5C551C6F7213C025768A288887D43A9FFF06DFD0990A7AF01E2C90274D6
Reporter LittleRedBean2
Tags:dll Gozi

Intelligence


File Origin
# of uploads :
3
# of downloads :
328
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 445164 Sample: 5.dll Startdate: 07/07/2021 Architecture: WINDOWS Score: 84 40 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->40 42 Found malware configuration 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 2 other signatures 2->46 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 1 53 2->10         started        process3 signatures4 48 Writes or reads registry keys via WMI 7->48 50 Writes registry values via WMI 7->50 12 rundll32.exe 7->12         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 7->17         started        24 2 other processes 7->24 19 iexplore.exe 24 10->19         started        22 iexplore.exe 26 10->22         started        process5 dnsIp6 52 Writes registry values via WMI 12->52 26 rundll32.exe 15->26         started        28 HHN-efz.ms-acdc.office.com 40.101.137.98, 443, 49723, 49724 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->28 30 outlook.com 40.97.116.82, 443, 49720, 49721 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->30 36 5 other IPs or domains 19->36 32 52.97.144.2, 443, 49731, 49732 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->32 34 FRA-efz.ms-acdc.office.com 52.97.152.210, 443, 49729, 49730 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->34 38 4 other IPs or domains 22->38 signatures7 process8
Threat name:
Win32.Trojan.Bulz
Status:
Malicious
First seen:
2021-07-07 08:40:18 UTC
AV detection:
10 of 46 (21.74%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:8877 banker trojan upx
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
outlook.com
auredosite.club
vuredosite.club
Unpacked files
SH256 hash:
a50fbee44054197d3b18e55e46040a2cdfa0f73c9a1e1fefa4bd5c06c5404f2d
MD5 hash:
995ae25b0ee5e8f35028575b3945f9f3
SHA1 hash:
d7eb1a42d1294747604161cb384551c77f4ed0fb
SH256 hash:
2e6636e77432cfba716311e73d3a80b9a2b51821601965d8b97e83952e0e4402
MD5 hash:
23c30ab497627bb42d26152eca69b219
SHA1 hash:
1b4e2f04f6a203737be13de45d2499c1889841ba
Detections:
win_isfb_auto
SH256 hash:
c521dd937ce9b2e8bda2fa915bae5b5be0e150a8b82e3b2bfb1cdbc60a8326c4
MD5 hash:
fceb6a51be4205d11be1491f6e263cae
SHA1 hash:
0abb60d37fac49912172c5385ff58e049520eb53
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:Ursnif3
Author:kevoreilly
Description:Ursnif Payload
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments