MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dac141db5d3b979ddf3490a47e333b3ec9b9112f5fb91d9442181db21599ff69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: dac141db5d3b979ddf3490a47e333b3ec9b9112f5fb91d9442181db21599ff69
SHA3-384 hash: 17c8734e82aae040122151aa0f573b19882a4dcff000e8f6d9a9b83899a2aa6b0269562b34432cf6eb9a30174ab772f8
SHA1 hash: 16a7179d17888438757fc2b013c1c9eb22d64e6c
MD5 hash: 029e269d606b603b1d24064b85a21d69
humanhash: victor-nebraska-carolina-violet
File name:029e269d606b603b1d24064b85a21d69.dll
Download: download sample
Signature Gozi
File size:960'000 bytes
First seen:2021-05-25 19:30:03 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 7a79d10b1d4343a18a4f6e25e165b4ae (62 x Gozi)
ssdeep 24576:HQfpzjXPgf28CJV4X+IBIJ3cazaLwj1mCG9CpNiLi:IFDgyJV4OaIRj150CpNiLi
Threatray 279 similar samples on MalwareBazaar
TLSH A815C03138C1C232D573A0780A69D6B04BADB4301D359B9F77DC2B7E6F715A092369AB
Reporter abuse_ch
Tags:dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
1
# of downloads :
377
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Running batch commands
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 424430 Sample: 9Z23YWR4VX.dll Startdate: 25/05/2021 Architecture: WINDOWS Score: 64 59 Antivirus / Scanner detection for submitted sample 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 Yara detected  Ursnif 2->63 9 loaddll32.exe 1 2->9         started        process3 process4 11 cmd.exe 1 9->11         started        13 rundll32.exe 9->13         started        15 rundll32.exe 9->15         started        17 5 other processes 9->17 process5 19 rundll32.exe 11->19         started        21 cmd.exe 1 13->21         started        23 cmd.exe 1 13->23         started        25 cmd.exe 1 15->25         started        27 cmd.exe 1 15->27         started        29 cmd.exe 1 17->29         started        31 cmd.exe 1 17->31         started        33 cmd.exe 1 17->33         started        35 3 other processes 17->35 process6 49 2 other processes 19->49 51 2 other processes 21->51 37 conhost.exe 23->37         started        39 conhost.exe 25->39         started        41 conhost.exe 27->41         started        43 conhost.exe 29->43         started        45 conhost.exe 31->45         started        47 conhost.exe 33->47         started        53 2 other processes 35->53 process7 55 conhost.exe 49->55         started        57 conhost.exe 49->57         started       
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-05-25 19:30:12 UTC
AV detection:
30 of 47 (63.83%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:4500 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
app3.maintorna.com
chat.billionady.com
app5.folion.xyz
wer.defone.click
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll dac141db5d3b979ddf3490a47e333b3ec9b9112f5fb91d9442181db21599ff69

(this sample)

  
Delivery method
Distributed via web download

Comments