00000000.00000003.379318249.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379318249.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379318249.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.379201744.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379201744.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379201744.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.379244595.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379244595.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379244595.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000002.507621836.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000002.507621836.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000002.506994526.000000000112F000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
00000000.00000002.506557066.0000000000CB9000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
00000000.00000003.470931903.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.470931903.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.470931903.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.379164621.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379164621.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379164621.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.453248169.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.453248169.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.453248169.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.470843781.0000000001429000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
00000000.00000003.379115531.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379115531.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379115531.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.379275340.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379275340.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379275340.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.379360683.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379360683.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379360683.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.484013460.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.484013460.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.379342148.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.379342148.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000000.00000003.379342148.00000000014A8000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c88:$a9: Software\AppDataLow\Software\Microsoft\
|
00000000.00000003.484040297.00000000012AC000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000000.00000003.470798619.00000000013AA000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif_1 | Yara detected Ursnif | Joe Security | |
Process Memory Space: main.exe PID: 6012 | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
Process Memory Space: main.exe PID: 6012 | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xc6512:$a5: filename="%.4u.%lu"
- 0xc6810:$a5: filename="%.4u.%lu"
- 0x198294:$a5: filename="%.4u.%lu"
- 0x198592:$a5: filename="%.4u.%lu"
- 0x19ce6e:$a5: filename="%.4u.%lu"
- 0x19d16c:$a5: filename="%.4u.%lu"
- 0x1a1847:$a5: filename="%.4u.%lu"
- 0x1a1b45:$a5: filename="%.4u.%lu"
- 0x2612e0:$a5: filename="%.4u.%lu"
- 0x2615de:$a5: filename="%.4u.%lu"
- 0xc5fda:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x197d5c:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x19c936:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x1a130f:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x260da8:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc5f07:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xc62c8:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xc65cb:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x19133e:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x191363:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x1914ef:$a8: %08X-%04X-%04X-%04X-%08X%04X
|
Process Memory Space: main.exe PID: 6012 | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xc6441:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0xc6742:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x1981c3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x1984c4:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x19cd9d:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x19d09e:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x1a1776:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x1a1a77:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x26120f:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x261510:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0xc5fda:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc6186:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x197d5c:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x197f08:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x19c936:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x19cae2:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x1a130f:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x1a14bb:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x260da8:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x260f54:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc64de:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
|
Process Memory Space: powershell.exe PID: 2620 | INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen | - 0x30524:$b2: ::FromBase64String(
- 0x11c688:$b2: ::FromBase64String(
- 0x1967aa:$b2: ::FromBase64String(
- 0x290946:$b2: ::FromBase64String(
- 0xdeab4:$s1: -join
- 0xdeaef:$s1: -join
- 0xdebf7:$s1: -join
- 0xdec25:$s1: -join
- 0xdef82:$s1: -join
- 0xdefa5:$s1: -join
- 0xdf357:$s1: -join
- 0xdf378:$s1: -join
- 0xdf3aa:$s1: -join
- 0xdf3f2:$s1: -join
- 0xdf41f:$s1: -join
- 0xdf446:$s1: -join
- 0xdf471:$s1: -join
- 0xdf48d:$s1: -join
- 0xdf554:$s1: -join
- 0xdfa04:$s1: -join
- 0xdfa26:$s1: -join
|
Click to see the 38 entries |