MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb046873b3f030de0d766f937da4c80774804c4f14ffbaa087e710ebfbcd22f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: cb046873b3f030de0d766f937da4c80774804c4f14ffbaa087e710ebfbcd22f7
SHA3-384 hash: 66827a89590263d9fb1b08c25738c375fb44d7e8032bc010c0aa59b2ca0fdd4236c2a168ea393e96bc6a7bc30127848a
SHA1 hash: 0a41bf0eba70f5053bdadeec9622afa39442ad31
MD5 hash: 04db991efbf71e08af29ded77ae9e1f3
humanhash: lima-monkey-apart-leopard
File name:zug11.bin
Download: download sample
Signature Gozi
File size:281'088 bytes
First seen:2020-07-21 21:15:37 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 26161595a9732d17601e4bdfceb9432b (2 x Gozi)
ssdeep 6144:BZ5BSrk7m4TO4uOeS+xJYAOKL4h/Jd9Yv6JBdeCBI:BZad4K4usaYR9tFeCBI
Threatray 798 similar samples on MalwareBazaar
TLSH 6B549E403A82C4BAD5BE19345938D6A6067DBC200F70DDFBABD45E2B4E391C19631E77
Reporter malware_traffic
Tags:dll Gozi IcedID

Intelligence


File Origin
# of uploads :
1
# of downloads :
67
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Connection attempt
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-07-21 21:17:04 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Modifies system certificate store
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Blacklisted process makes network request
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments