MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f0606eb18477cfec7939d20432ba7999ac9044dfbc936a0071cbe920d02a7e1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 10


Intelligence 10 IOCs YARA 2 File information Comments

SHA256 hash: f0606eb18477cfec7939d20432ba7999ac9044dfbc936a0071cbe920d02a7e1c
SHA3-384 hash: 5aaeec5c97f56d0db9297f48fbf3c8ead36646c74295e6a3726a5bdd402189592b10c4b45adccdbf62984f7400242cc2
SHA1 hash: a35ca983f24ba127b97063a5b9c2bf7d3f55efea
MD5 hash: f338289d8825b856528d01a541a320c3
humanhash: november-zebra-twelve-venus
File name:t2B88
Download: download sample
Signature Gozi
File size:76'800 bytes
First seen:2023-03-01 12:02:51 UTC
Last seen:2023-03-01 13:28:53 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash a71af803ab98f7bcd5d23c5f5b2ca9bf (1 x Gozi)
ssdeep 1536:Y3fVETlyqHjWuQIKbZZcuB0m5OgJvi9THQIGKlAVp0t:AfiTlyqHTDWF0m5kT9GKl8p0
Threatray 373 similar samples on MalwareBazaar
TLSH T14D7317F3E75C6184D8A78C36AE4236F10185E95225319FCE1192ED39FF280D78729A9F
TrID 37.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
20.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
12.7% (.EXE) Win64 Executable (generic) (10523/12/4)
7.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 0070e8d4d4e87000 (1 x Gozi)
Reporter JAMESWT_WT
Tags:agenziaentrate dll Gozi related

Intelligence


File Origin
# of uploads :
2
# of downloads :
237
Origin country :
IT IT
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
anti-vm packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Found API chain indicative of debugger detection
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Gozi
Status:
Malicious
First seen:
2023-03-01 12:02:57 UTC
File Type:
PE (Dll)
Extracted files:
7
AV detection:
19 of 25 (76.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:gozi botnet:5050 banker isfb trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi
Malware Config
C2 Extraction:
https://config.edge.skype.com
157.254.195.117
91.215.85.151
Unpacked files
SH256 hash:
34456ec685b6e0c9a0a3603d17f61b1268e897332ca4ec1309ab2b44ae262c69
MD5 hash:
978317b6aa5ac42f6c9497d1a30790f8
SHA1 hash:
837c3c2de7a3e5095cb47864ab5cc30fb53eafcb
SH256 hash:
771ef0b39c87089e0118e4fb4ae27f9a3d13b0a0f6789318c3ae0460289a270a
MD5 hash:
f8355ec0b2b8ac110f77c65cf6dcdd80
SHA1 hash:
789852391ca9226210f4daddeb42ddb1d7bd739a
SH256 hash:
f0606eb18477cfec7939d20432ba7999ac9044dfbc936a0071cbe920d02a7e1c
MD5 hash:
f338289d8825b856528d01a541a320c3
SHA1 hash:
a35ca983f24ba127b97063a5b9c2bf7d3f55efea
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.isfb.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments