General

  • Target

    view_presentation_s1v.js

  • Size

    1.1MB

  • Sample

    200417-p8wec41ve6

  • MD5

    bec9e707404efce0517e706450067520

  • SHA1

    4c146e386fcc547359eb6f5b9e8b1ebf8ca8d6e5

  • SHA256

    b7eea25df9616cb260aede55526c4133e193e9459fcd32ba87abf446259ef811

  • SHA512

    275a1982cce2edef38ff25d9e56661519f752b2c56838e5ebe44b67433290328afe23e2c301de2e0bbb75eabbe44817a3029fc844ff542e227b2d2c7df9d026b

Malware Config

Targets

    • Target

      view_presentation_s1v.js

    • Size

      1.1MB

    • MD5

      bec9e707404efce0517e706450067520

    • SHA1

      4c146e386fcc547359eb6f5b9e8b1ebf8ca8d6e5

    • SHA256

      b7eea25df9616cb260aede55526c4133e193e9459fcd32ba87abf446259ef811

    • SHA512

      275a1982cce2edef38ff25d9e56661519f752b2c56838e5ebe44b67433290328afe23e2c301de2e0bbb75eabbe44817a3029fc844ff542e227b2d2c7df9d026b

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Ursnif, Dreambot

      Ursnif is a variant of the Gozi IFSB with more capabilities.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks