00000003.00000003.418603485.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418603485.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418603485.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418848530.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418848530.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418848530.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418746602.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418746602.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418746602.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000002.773492511.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000002.773492511.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000002.773492511.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418705359.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418705359.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418705359.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418786736.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418786736.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418786736.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418863496.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418863496.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418863496.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418642930.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418642930.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418642930.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
00000003.00000003.418675035.0000000005108000.00000004.00000020.00020000.00000000.sdmp | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
00000003.00000003.418675035.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0xff0:$a1: /C ping localhost -n %u && del "%s"
- 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
- 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
- 0xca8:$a5: filename="%.4u.%lu"
- 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xe72:$a9: &whoami=%s
- 0xe5a:$a10: %u.%u_%u_%u_x%u
- 0xc22:$a11: size=%u&hash=0x%08x
- 0xc13:$a12: &uptime=%u
- 0xda7:$a13: %systemroot%\system32\c_1252.nls
- 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
|
00000003.00000003.418675035.0000000005108000.00000004.00000020.00020000.00000000.sdmp | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
|
Process Memory Space: rundll32.exe PID: 5412 | JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | |
Process Memory Space: rundll32.exe PID: 5412 | Windows_Trojan_Gozi_fd494041 | unknown | unknown | - 0x11a2:$a5: filename="%.4u.%lu"
- 0x14a0:$a5: filename="%.4u.%lu"
- 0x68ae:$a5: filename="%.4u.%lu"
- 0x6bac:$a5: filename="%.4u.%lu"
- 0xc6a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x6376:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x3c9:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x3ee:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x57a:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xb97:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0xf58:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x125b:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x5e2b:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x5f89:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x62a3:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x6664:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x6967:$a8: %08X-%04X-%04X-%04X-%08X%04X
- 0x1626:$a9: &whoami=%s
- 0x6d32:$a9: &whoami=%s
- 0x160e:$a10: %u.%u_%u_%u_x%u
- 0x6d1a:$a10: %u.%u_%u_%u_x%u
|
Process Memory Space: rundll32.exe PID: 5412 | Windows_Trojan_Gozi_261f5ac5 | unknown | unknown | - 0x10d1:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x13d2:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x67dd:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0x6ade:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
- 0xc6a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0xe16:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x6376:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x6522:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
- 0x116e:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x146c:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x687a:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x6b78:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
- 0x1002:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x1306:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x670e:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x6a12:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
- 0x1232:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1537:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1bf0:$a9: Software\AppDataLow\Software\Microsoft\
- 0x1c3d:$a9: Software\AppDataLow\Software\Microsoft\
- 0x693e:$a9: Software\AppDataLow\Software\Microsoft\
|
Click to see the 25 entries |