MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8093c755d566699bd222c13ff5b01e952e31a1a2da2f37919550b1c3bd99833. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: c8093c755d566699bd222c13ff5b01e952e31a1a2da2f37919550b1c3bd99833
SHA3-384 hash: 720a0905e88c9e97a5b49b5fad5751f4351416ef8789ba8786134a16b6040441ca36b6e55c07a0d00959ab7a64010706
SHA1 hash: 737c21990393d29e3eb068eadf924886771ed2a2
MD5 hash: 90ce70f19c5a5a35fa82641578ae53cc
humanhash: london-vermont-purple-batman
File name:SecuriteInfo.com.Trojan.Agent.ERAA.20169.30190
Download: download sample
Signature Gozi
File size:3'456'512 bytes
First seen:2020-05-18 11:49:57 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 71dd4a947e37a266cc9ba4fdb9572085 (1 x Gozi)
ssdeep 98304:9aJauZYyUP5k1QjJosXOMclEvaWI9NpLlx:92auULTpnah97hx
Threatray 719 similar samples on MalwareBazaar
TLSH 32F54B60339CE225E5A50B304C62E4E944A57F4DDF22995FB0EA3F0FE1B66844D6CB4B
Reporter SecuriteInfoCom
Tags:Gozi

Intelligence


File Origin
# of uploads :
1
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Danabot
Status:
Malicious
First seen:
2020-05-18 12:35:50 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
17 of 31 (54.84%)
Threat level:
  2/5
Result
Malware family:
danabot
Score:
  10/10
Tags:
family:danabot banker trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Blacklisted process makes network request
Danabot
Malware Config
C2 Extraction:
172.81.129.196
54.38.22.65
192.99.219.207
51.255.134.130
192.236.179.73
23.82.140.201
45.147.228.92
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments