MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff5a6e3516ba8bd8346c1cafd871051bb3c15b0f4551b889e334cd38ca663af2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Gozi


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: ff5a6e3516ba8bd8346c1cafd871051bb3c15b0f4551b889e334cd38ca663af2
SHA3-384 hash: f3ccabe19686290905f7c2de89ef72c3befe5f114ba8dc503096b7653fee8dd7cebce892efe558dfa72e64d738ceedf8
SHA1 hash: 2e7df1d820851fa84c6fbb33a5578272c22c369e
MD5 hash: 596fa9be9e11c9f48b4a2b4ded030999
humanhash: alabama-helium-alaska-fish
File name:f0t0s.jpg.dll
Download: download sample
Signature Gozi
File size:142'192 bytes
First seen:2021-01-21 10:24:12 UTC
Last seen:2021-01-21 10:40:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 431cc7666fc753c82d159c21afde5b70 (1 x Gozi)
ssdeep 1536:6kokp6SH9UoehZ96fWCCPh9HqXnMaytQCW+ZN/18YN2IXz6bdmH3Rzv5pE+u7onP:6kdbhehZ8L3McCDqYN2KHBzv5pEJUnP
Threatray 85 similar samples on MalwareBazaar
TLSH 84D3CF9778D4A0A5ED98423D18F9D773D96EFCF80A3E7D022AE080CD44276ED4B265D2
Reporter JAMESWT_WT
Tags:dll Gozi inps isfb italy Ursnif

Code Signing Certificate

Organisation:VeriSign Time Stamping Services Signer - G2
Issuer:VeriSign Time Stamping Services CA
Algorithm:sha1WithRSAEncryption
Valid from:Jun 15 00:00:00 2007 GMT
Valid to:Jun 14 23:59:59 2012 GMT
Serial number: 3825D7FAF861AF9EF490E726B5D65AD5
Intelligence: 44 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 8815DFF787F21FA8106760CB89C5B4493F4BD45E2CE801D2A4FE1F61DEE0C039
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
398
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f0t0s.jpg.dll
Verdict:
No threats detected
Analysis date:
2021-01-21 10:33:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
DNS request
Searching for the window
Deleting a recently created file
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
80 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Writes or reads registry keys via WMI
Writes registry values via WMI
Yara detected Ursnif
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 342575 Sample: f0t0s.jpg.dll Startdate: 21/01/2021 Architecture: WINDOWS Score: 80 32 Found malware configuration 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected  Ursnif 2->36 38 2 other signatures 2->38 8 loaddll32.exe 1 2->8         started        process3 process4 10 regsvr32.exe 8->10         started        13 cmd.exe 1 8->13         started        signatures5 40 Writes or reads registry keys via WMI 10->40 42 Writes registry values via WMI 10->42 15 iexplore.exe 1 83 13->15         started        process6 process7 17 iexplore.exe 152 15->17         started        20 iexplore.exe 25 15->20         started        22 iexplore.exe 29 15->22         started        dnsIp8 24 edge.gycpi.b.yahoodns.net 87.248.118.23, 443, 49770, 49771 YAHOO-DEBDE United Kingdom 17->24 26 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49764, 49765 FASTLYUS United States 17->26 30 9 other IPs or domains 17->30 28 ocsp.sca1b.amazontrust.com 143.204.214.142, 49799, 49800, 80 AMAZON-02US United States 20->28
Threat name:
Win32.Trojan.Ursnif
Status:
Malicious
First seen:
2021-01-21 10:24:02 UTC
File Type:
PE (Dll)
AV detection:
25 of 46 (54.35%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Unpacked files
SH256 hash:
ff5a6e3516ba8bd8346c1cafd871051bb3c15b0f4551b889e334cd38ca663af2
MD5 hash:
596fa9be9e11c9f48b4a2b4ded030999
SHA1 hash:
2e7df1d820851fa84c6fbb33a5578272c22c369e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Gozi

Executable exe ff5a6e3516ba8bd8346c1cafd871051bb3c15b0f4551b889e334cd38ca663af2

(this sample)

Comments