MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8dcca39bbd580d2a5a4e1948b84d21a4715e257a57a3808d2df052f3bb9f27c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 2


Intelligence 2 IOCs YARA File information Comments

SHA256 hash: f8dcca39bbd580d2a5a4e1948b84d21a4715e257a57a3808d2df052f3bb9f27c
SHA3-384 hash: fdcb63ea5611a4c962acc53baf0ea5749d007a6c234b50347787d80f4bc1a04f4aa65f82e75e8076a6b9b6dee3ff49be
SHA1 hash: b54e2c9c005ff169773196aecdaaba3867dc7f4c
MD5 hash: 377d78de5f27e490a61da799a2456185
humanhash: venus-princess-arizona-comet
File name:bespokemerchandises.com_wrong__12B7Ai1.exe.malw
Download: download sample
Signature Gozi
File size:334'426 bytes
First seen:2020-05-21 13:28:09 UTC
Last seen:2020-05-21 15:45:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c8c95a8437da5797cf192c4cf27b186f (327 x Gozi)
ssdeep 3072:leYLrN2UApXRBZaKBEd/UslN0r//a0tziOOdltWdnDhNu:4Y9peR+KBjziOOPtWdnDv
Threatray 552 similar samples on MalwareBazaar
TLSH D9647591A953DF7DD09C25B6E5ED0B0610A2F4284F078B976E180D703FA3EA2E69435F
Reporter ov3rflow1
Tags:malw

Code Signing Certificate

Organisation:UTN-USERFirst-Object
Issuer:AddTrust External CA Root
Algorithm:sha1WithRSAEncryption
Valid from:Jun 7 08:09:10 2005 GMT
Valid to:May 30 10:48:38 2020 GMT
Serial number: 421AF2940984191F520A4BC62426A74B
Intelligence: 307 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2CF1EC6AB594113BD538DF6D5C940E3319B424F8756D975888072C6AB558B771
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2020-05-21 12:49:54 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments