MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA 1 File information Comments

SHA256 hash: f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f
SHA3-384 hash: fe7e9af8957d8959e6da4a3e99408836ef30d6c06dbcedad08e6688e34d11f802a00626de3766e889dcce50b06e30067
SHA1 hash: dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708
MD5 hash: d31c0491f522d6b9f2102109bd2420af
humanhash: arizona-papa-autumn-magnesium
File name:ioir.png.dll
Download: download sample
Signature Gozi
File size:552'448 bytes
First seen:2021-02-05 14:09:13 UTC
Last seen:2021-02-05 16:16:36 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 127ef7eee4def6f47e8e66d53f8ddc7c (1 x Gozi)
ssdeep 12288:XCY7z0vLfhyqJ0UYek/zLOmyK8rkApSc1jJFX:SWz09yqJ5Ye6PHuNScBJF
Threatray 629 similar samples on MalwareBazaar
TLSH E5C47E63B2E14837D1631E789D2B97B8A837BF102D24784A6BF51C4C5F39681386A3D7
Reporter Anonymous
Tags:Gozi isfbv3 Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
284
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Using the Windows Management Instrumentation requests
Launching a process
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
68 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Multi AV Scanner detection for submitted file
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 349160 Sample: ioir.png.dll Startdate: 05/02/2021 Architecture: WINDOWS Score: 68 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected  Ursnif 2->26 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 1 76 2->10         started        process3 signatures4 28 Writes or reads registry keys via WMI 7->28 30 Writes registry values via WMI 7->30 12 rundll32.exe 7->12         started        15 iexplore.exe 26 10->15         started        18 iexplore.exe 22 10->18         started        process5 dnsIp6 32 Contains functionality to detect sleep reduction / modifications 12->32 20 WerFault.exe 23 9 12->20         started        22 topitophug.xyz 45.133.216.103, 443, 49744, 49745 CLOUDSOLUTIONSRU Russian Federation 15->22 signatures7 process8
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-02-04 22:27:57 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
gozi_rm3
Score:
  10/10
Tags:
family:gozi_rm3 botnet:201193207 banker trojan
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Program crash
Blocklisted process makes network request
Gozi RM3
Malware Config
C2 Extraction:
https://topitophug.xyz
Unpacked files
SH256 hash:
99974e8073f586697a5c2ee5019e232efa74c953985af41ee22eb3d9f66c9236
MD5 hash:
c3b9e783c5ef0499b5cc5111952c6177
SHA1 hash:
61c6acd6c64da30e40b9babc9289a546f5e0a898
Detections:
win_isfb_auto
SH256 hash:
f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f
MD5 hash:
d31c0491f522d6b9f2102109bd2420af
SHA1 hash:
dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_isfb_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

DLL dll f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f

(this sample)

  
Delivery method
Distributed via web download

Comments