MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da7d4504a4f835edc31ff33bb0e894dbde5c93a4834c6a125ddfc7a9d7b65f5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: da7d4504a4f835edc31ff33bb0e894dbde5c93a4834c6a125ddfc7a9d7b65f5c
SHA3-384 hash: 2fddf6337fdf814579310266fc7bb28e5d8c15ea3ae1b1ed093640174c23156ee4fb81c6dc08114e980c4d76d872a812
SHA1 hash: fb0b12544e50337b5230ead9ddebab70f92c24ad
MD5 hash: 09ccfdcc67124ea3c39a391fb76c6699
humanhash: illinois-alaska-alanine-missouri
File name:bespokemerchandises.com_wrong__2B7Ai1.exe.malw
Download: download sample
Signature Gozi
File size:334'793 bytes
First seen:2020-05-21 13:31:48 UTC
Last seen:2020-05-21 16:26:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c8c95a8437da5797cf192c4cf27b186f (327 x Gozi)
ssdeep 3072:leYLrN2UApXRBZaKBEd/UslN0r//a0tziOOdltWdnDhNu:4Y9peR+KBjziOOPtWdnDv
Threatray 552 similar samples on MalwareBazaar
TLSH B7647591A953DF7DD09C25B6E5ED0B0610A2F4284F078B976E180D703FA3EA2E69435F
Reporter ov3rflow1
Tags:malw

Code Signing Certificate

Organisation:UTN-USERFirst-Object
Issuer:AddTrust External CA Root
Algorithm:sha1WithRSAEncryption
Valid from:Jun 7 08:09:10 2005 GMT
Valid to:May 30 10:48:38 2020 GMT
Serial number: 421AF2940984191F520A4BC62426A74B
Intelligence: 307 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2CF1EC6AB594113BD538DF6D5C940E3319B424F8756D975888072C6AB558B771
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2020-05-21 12:51:41 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
29 of 31 (93.55%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments