MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2dfc3562e150ca045557559269c3c21531bb85292864109fd2ceca4fe0f1ea9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: f2dfc3562e150ca045557559269c3c21531bb85292864109fd2ceca4fe0f1ea9
SHA3-384 hash: d254e85c0efbf8d9d9480f91967469d714f5421be72eeb6674a6c0b54919eba0fa43c0d4f62e5ad60078ef0df454ebce
SHA1 hash: 4579705a3e0e8b644fcf30d4c79456b0e4f669b8
MD5 hash: 1c87b3ebc5ddf8f53e585b3cf8f74f47
humanhash: dakota-nine-zebra-three
File name:1c8.dll
Download: download sample
Signature Gozi
File size:381'440 bytes
First seen:2021-07-14 13:44:45 UTC
Last seen:2021-07-14 15:07:47 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 4c29865e356872ef0757b58734cbbb11 (3 x Gozi)
ssdeep 6144:vC8nRa6tXFOspzA7z6NZVeC8i795fubASK9beZTX3l8Eo:J0SVOsp5VWi7PWoBeZTX36
Threatray 548 similar samples on MalwareBazaar
TLSH T198847A00BA80E031D6F212724F29E585536C78A80B715ADFB3D82E5F5F798E36635B93
Reporter 0x746f6d6669
Tags:dll Gozi

Intelligence


File Origin
# of uploads :
2
# of downloads :
269
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
80 / 100
Signature
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 448651 Sample: 1c8.dll Startdate: 14/07/2021 Architecture: WINDOWS Score: 80 40 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->40 42 Found malware configuration 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected  Ursnif 2->46 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 1 54 2->10         started        process3 signatures4 48 Writes or reads registry keys via WMI 7->48 50 Writes registry values via WMI 7->50 12 rundll32.exe 7->12         started        15 cmd.exe 1 7->15         started        17 rundll32.exe 7->17         started        24 2 other processes 7->24 19 iexplore.exe 24 10->19         started        22 iexplore.exe 26 10->22         started        process5 dnsIp6 52 Writes registry values via WMI 12->52 26 rundll32.exe 15->26         started        28 outlook.com 40.97.128.194, 443, 49741, 49742 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->28 30 ZRH-efz.ms-acdc.office.com 52.97.232.194, 443, 49744, 49745 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 19->30 36 5 other IPs or domains 19->36 32 52.97.201.226, 443, 49750, 49751 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 22->32 34 www.outlook.com 22->34 38 3 other IPs or domains 22->38 signatures7 process8
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-07-08 15:56:01 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:8877 banker trojan
Behaviour
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
outlook.com
auredosite.club
vuredosite.club
Unpacked files
SH256 hash:
b7b58bd19f656f0f94c54c687a8af231671a656b64698f91a89a6aae916f6722
MD5 hash:
1b865f2fb1d7252806b5c72cbfdab129
SHA1 hash:
51d00976bcc2a880ab8bb30b35217566fea7edc1
Detections:
win_isfb_auto
SH256 hash:
f2dfc3562e150ca045557559269c3c21531bb85292864109fd2ceca4fe0f1ea9
MD5 hash:
1c87b3ebc5ddf8f53e585b3cf8f74f47
SHA1 hash:
4579705a3e0e8b644fcf30d4c79456b0e4f669b8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments