MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e4a5317a1b7c1ab91bb131dba5fea06fdb89e38c291e17f71b5c1634cfddecbe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: e4a5317a1b7c1ab91bb131dba5fea06fdb89e38c291e17f71b5c1634cfddecbe
SHA3-384 hash: 836d9eb15466d4dedc37506429bfd1328c1bf6140f12c595425b8ed3656744acd7fc6d87b1af3fc8979a0d15a09fcf9c
SHA1 hash: bd34e4d57bfc1938ebc93d8f404dbe7e019db0cf
MD5 hash: a17de50fcd71c572f423c943f926c2a9
humanhash: solar-steak-vegan-charlie
File name:6.dll
Download: download sample
Signature Gozi
File size:516'096 bytes
First seen:2021-08-23 12:39:07 UTC
Last seen:2021-08-23 17:53:38 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 241e3141afa42b2aa84ab0b3655f0b1e (1 x Gozi)
ssdeep 12288:B7wAjlh98sQ73RBgy6aqGT8jSXxhYb/iWVEJ10mVSV/+K/BCz7uW:B7wAQsQ735TYb/qhVSk3
Threatray 476 similar samples on MalwareBazaar
TLSH T16EB46C027A93E024E5F952F94FB1C6D8A71D79224B6850CFB5F43AAF0F285E39831356
Reporter James_inthe_box
Tags:brt dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'817
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching a process
Sending a UDP request
Using the Windows Management Instrumentation requests
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Found malware configuration
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.BankerX
Status:
Malicious
First seen:
2021-08-23 12:39:09 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
7 of 46 (15.22%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:8877 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Blocklisted process makes network request
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
outlook.com
xaaorunokee.site
taaorunokee.site
Unpacked files
SH256 hash:
cc89669a3ca75594456e91595e249f02e41a5b66d1f256a2281804c10ea13c23
MD5 hash:
6eb6ef0ed1b8b345412f9545571042e2
SHA1 hash:
b9a1945c04610ae72265c5da6ccfe29ca1a4c52e
Detections:
win_isfb_auto
SH256 hash:
e4a5317a1b7c1ab91bb131dba5fea06fdb89e38c291e17f71b5c1634cfddecbe
MD5 hash:
a17de50fcd71c572f423c943f926c2a9
SHA1 hash:
bd34e4d57bfc1938ebc93d8f404dbe7e019db0cf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments