Advertisement
paladin316

Gozi_f544068a7fc24552d9219c8bee06aabd Malware JSON Report

Jun 17th, 2019
1,520
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.68 KB | None | 0 0
  1.  
  2. [*] MalFamily: "Malicious"
  3.  
  4. [*] MalScore: 10.0
  5.  
  6. [*] File Name: "Gozi_f544068a7fc24552d9219c8bee06aabd.doc"
  7. [*] File Size: 620032
  8. [*] File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. [*] SHA256: "0eaa4c797ede1afd32f2cfce63999cb3b375773f4805cd42e006f5d805985091"
  10. [*] MD5: "f544068a7fc24552d9219c8bee06aabd"
  11. [*] SHA1: "a91c76138d9437a445dd622145f60727e1c78f5b"
  12. [*] SHA512: "604c005f0c0afcab42a7674d4f4dfa3a4f77f9ee290e70d1308012f4208d83bbcf87ca5ea305fc1048775c7b3f39f4923cf764e6166d348612d15a3b26f29a78"
  13. [*] CRC32: "78A270A6"
  14. [*] SSDEEP: "12288:3eUyF7BbJdVNKQPhYc9BKSBXPOs1h8DevXp0Pz4SS:uUyFVP/KQPhYmBKSn1h8DYp0L"
  15.  
  16. [*] Process Execution: [
  17. "Gozi_f544068a7fc24552d9219c8bee06aabd.doc",
  18. "control.exe",
  19. "rundll32.exe",
  20. "explorer.exe"
  21. ]
  22.  
  23. [*] Signatures Detected: [
  24. {
  25. "Description": "Creates RWX memory",
  26. "Details": []
  27. },
  28. {
  29. "Description": "Possible date expiration check, exits too soon after checking local time",
  30. "Details": [
  31. {
  32. "process": "control.exe, PID 2668"
  33. }
  34. ]
  35. },
  36. {
  37. "Description": "Deletes its original binary from disk",
  38. "Details": []
  39. },
  40. {
  41. "Description": "Executed a process and injected code into it, probably while unpacking",
  42. "Details": [
  43. {
  44. "Injection": "Gozi_f544068a7fc24552d9219c8bee06aabd.doc(1368) -> control.exe(2668)"
  45. }
  46. ]
  47. },
  48. {
  49. "Description": "Sniffs keystrokes",
  50. "Details": [
  51. {
  52. "SetWindowsHookExA": "Process: explorer.exe(1940)"
  53. }
  54. ]
  55. },
  56. {
  57. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  58. "Details": [
  59. {
  60. "Spam": "Gozi_f544068a7fc24552d9219c8bee06aabd.doc (1368) called API GlobalMemoryStatus 2155336 times"
  61. }
  62. ]
  63. },
  64. {
  65. "Description": "Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config",
  66. "Details": [
  67. {
  68. "regkeyval": "HKEY_CURRENT_USER\\Software\\AppDataLow\\Software\\Microsoft\\0EEC6689-1584-7006-0F22-19A4B3765D18\\Client32"
  69. },
  70. {
  71. "regkeyval": "HKEY_CURRENT_USER\\Software\\AppDataLow\\Software\\Microsoft\\0EEC6689-1584-7006-0F22-19A4B3765D18\\Client64"
  72. }
  73. ]
  74. },
  75. {
  76. "Description": "Installs itself for autorun at Windows startup",
  77. "Details": [
  78. {
  79. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\aecaM1M0"
  80. },
  81. {
  82. "data": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\ApiMM1M0\\aeevpisp.exe"
  83. }
  84. ]
  85. },
  86. {
  87. "Description": "File has been identified by 19 Antiviruses on VirusTotal as malicious",
  88. "Details": [
  89. {
  90. "Cylance": "Unsafe"
  91. },
  92. {
  93. "Symantec": "Packed.Generic.525"
  94. },
  95. {
  96. "APEX": "Malicious"
  97. },
  98. {
  99. "Paloalto": "generic.ml"
  100. },
  101. {
  102. "Alibaba": "Packed:Application/Generic.3d1fc793"
  103. },
  104. {
  105. "Avast": "FileRepMetagen [Malware]"
  106. },
  107. {
  108. "Qihoo-360": "HEUR/QVM10.1.EA21.Malware.Gen"
  109. },
  110. {
  111. "Invincea": "heuristic"
  112. },
  113. {
  114. "McAfee-GW-Edition": "BehavesLike.Win32.MultiPlug.jh"
  115. },
  116. {
  117. "FireEye": "Generic.mg.f544068a7fc24552"
  118. },
  119. {
  120. "SentinelOne": "DFI - Suspicious PE"
  121. },
  122. {
  123. "Endgame": "malicious (high confidence)"
  124. },
  125. {
  126. "Microsoft": "Trojan:Win32/Wacatac.B!ml"
  127. },
  128. {
  129. "Acronis": "suspicious"
  130. },
  131. {
  132. "Malwarebytes": "Trojan.MalPack.GS.Generic"
  133. },
  134. {
  135. "Rising": "Trojan.Kryptik!8.8/N3#84% (RDM+:cmRtazqxLDGHFa5ZcZyZKeFvyTFJ)"
  136. },
  137. {
  138. "AVG": "FileRepMetagen [Malware]"
  139. },
  140. {
  141. "Cybereason": "malicious.38d943"
  142. },
  143. {
  144. "CrowdStrike": "win/malicious_confidence_90% (D)"
  145. }
  146. ]
  147. },
  148. {
  149. "Description": "Creates a copy of itself",
  150. "Details": [
  151. {
  152. "copy": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\ApiMM1M0\\aeevpisp.exe"
  153. }
  154. ]
  155. }
  156. ]
  157.  
  158. [*] Started Service: []
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement