MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f9df666658282d040451818e7134e4f8f7e5467dae5e390f79b541411a142738. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: f9df666658282d040451818e7134e4f8f7e5467dae5e390f79b541411a142738
SHA3-384 hash: 41a794baee8e1148a4ca5bc3c533124f51fee49f8b7c424c87bff85c914532800b94abb042274279f48c67399bf52d51
SHA1 hash: 6f99ea49ba8c2a60d097a7ebf84a5b46cafd6eb4
MD5 hash: e594e5db9250c13c9c5fc83f54b9a761
humanhash: magazine-alaska-violet-texas
File name:racial.drc
Download: download sample
Signature Gozi
File size:527'872 bytes
First seen:2021-06-02 20:00:35 UTC
Last seen:2021-06-02 20:48:31 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 3bfdfe7fdedde57f8d113c7e630bd750 (26 x Gozi)
ssdeep 12288:Y43cTGrLptoCKEV76KDpMGPaISTcN9saAvaqW6mZuzuJPjX7R75:vz75tzST8ASq8
Threatray 295 similar samples on MalwareBazaar
TLSH 45B4D000B682F976C02549399F96F5E4471CBC144F691A9B32C86FAF6F3E18305397AB
Reporter bigmacjpg
Tags:dll Gozi isfb Ursnif

Intelligence


File Origin
# of uploads :
2
# of downloads :
441
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Creating a window
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 428665 Sample: racial.drc Startdate: 02/06/2021 Architecture: WINDOWS Score: 64 28 Found malware configuration 2->28 30 Multi AV Scanner detection for submitted file 2->30 32 Yara detected  Ursnif 2->32 7 loaddll32.exe 1 2->7         started        process3 process4 9 iexplore.exe 2 85 7->9         started        11 cmd.exe 1 7->11         started        13 regsvr32.exe 7->13         started        15 rundll32.exe 7->15         started        process5 17 iexplore.exe 5 145 9->17         started        20 rundll32.exe 11->20         started        dnsIp6 22 edge.gycpi.b.yahoodns.net 87.248.118.23, 443, 49748, 49749 YAHOO-DEBDE United Kingdom 17->22 24 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49750, 49751 FASTLYUS United States 17->24 26 10 other IPs or domains 17->26
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-06-02 20:01:08 UTC
AV detection:
11 of 29 (37.93%)
Threat level:
  5/5
Result
Malware family:
gozi_ifsb
Score:
  10/10
Tags:
family:gozi_ifsb botnet:1500 banker trojan
Behaviour
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Gozi, Gozi IFSB
Malware Config
C2 Extraction:
authd.feronok.com
raw.pablowilliano.at
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments