MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f635354e86b28a65eb77122574493cfe2e37efeca2d3df316a4880db6e3786b9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 3


Intelligence 3 IOCs YARA 3 File information Comments

SHA256 hash: f635354e86b28a65eb77122574493cfe2e37efeca2d3df316a4880db6e3786b9
SHA3-384 hash: bc356c3927590418572db945c26d78d509ccbaa1b7ee49edf98654c7ba34d408847d62645e861f362a43530c8ccc3c83
SHA1 hash: a09ed482eeda64ed5b4e3d090e81da5c7748bfd9
MD5 hash: ade6bcd3535fb263392586a1782b6cce
humanhash: india-glucose-maryland-carbon
File name:f635354e86b28a65eb77122574493cfe2e37efeca2d3df316a4880db6e3786b9
Download: download sample
Signature Gozi
File size:1'024'064 bytes
First seen:2020-06-29 07:19:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 51bd2a77b42f5be5faef44283deb98b3 (1 x Gozi)
ssdeep 24576:iFRcrvTHFwu4zKPHIG4s0wJB0Q4L8BNqaFX6ekYtMGXpS81K:7bHFazYHIc0e0Ypcebwx
Threatray 3'119 similar samples on MalwareBazaar
TLSH 5F25F1DEF957BC8DD8DF20309D3AEAB217156C53F0864A8BAFDC77A2D972142E600452
Reporter JAMESWT_WT
Tags:Gozi

Code Signing Certificate

Organisation:Oracle Industries
Issuer:COMODO RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Sep 18 00:00:00 2017 GMT
Valid to:Sep 18 23:59:59 2018 GMT
Serial number: C764C8D311E93C513C61DA736D229C27
Thumbprint Algorithm:SHA256
Thumbprint: 1C2EF42321D534490F02CB80AD3174AAC2D2DB158EDFA3297FDF783B2C8B00F1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
63
Origin country :
n/a
Vendor Threat Intelligence
Threat name:
Win32.Trojan.Xpun
Status:
Malicious
First seen:
2017-12-04 00:24:54 UTC
File Type:
PE (Exe)
Extracted files:
34
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Runs ping.exe
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:RemoteStrings
Author:Katie Kleemola
Description:indicators for remote.dll - surtr stage 2
Rule name:win_isfb_a4
Author:Slavo Greminger, SWITCH-CERT
Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments