MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4ef5bd8b26c249bc9a0be3ec45582b56c5c3fcb0f7c7b1251466fc488ca4e47. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: f4ef5bd8b26c249bc9a0be3ec45582b56c5c3fcb0f7c7b1251466fc488ca4e47
SHA3-384 hash: bb746c4f828fb0ff2874832be6a99e2977f9d33eab8f9b85b3ae1f055dc3c37694fc46a0099fc8ea1b04a979bf70c58b
SHA1 hash: 830e81c7804bc23d4ea456582102ce0abdebee48
MD5 hash: 1748fe4ea15c41adf6a7f5d4609b7a2a
humanhash: wolfram-freddie-thirteen-winter
File name:bespokemerchandises.com_wrong__11B7Ai1.exe.malw
Download: download sample
Signature Gozi
File size:334'706 bytes
First seen:2020-05-21 13:28:00 UTC
Last seen:2020-05-21 15:42:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c8c95a8437da5797cf192c4cf27b186f (327 x Gozi)
ssdeep 3072:leYLrN2UApXRBZaKBEd/UslN0r//a0tziOOdltWdnDhNu:4Y9peR+KBjziOOPtWdnDv
Threatray 552 similar samples on MalwareBazaar
TLSH F2647691A953DF7DD09C25B6E5ED0B0610A2F4284F078B976E180D703FA3EA2E69435F
Reporter ov3rflow1
Tags:malw

Code Signing Certificate

Organisation:UTN-USERFirst-Object
Issuer:AddTrust External CA Root
Algorithm:sha1WithRSAEncryption
Valid from:Jun 7 08:09:10 2005 GMT
Valid to:May 30 10:48:38 2020 GMT
Serial number: 421AF2940984191F520A4BC62426A74B
Intelligence: 307 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2CF1EC6AB594113BD538DF6D5C940E3319B424F8756D975888072C6AB558B771
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2020-05-21 12:51:41 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
30 of 30 (100.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments