General

  • Target

    look_presentation_s4u.js

  • Size

    1.4MB

  • Sample

    200417-xwx2byr11x

  • MD5

    a7f767779dd68f33392a2162ff9392d6

  • SHA1

    4c78f182d039cdf20c8d569ff6f6410d0bca7c50

  • SHA256

    44f7552b9707171e3b0e9f7ce8fbca5aee06ad5e47787cbaf5c8ec78134db687

  • SHA512

    f2bb65dcad91a71f9b7a0ecc1db59ed19024549b279546c384b266a0ad430a2b9697e3aaf6a38e511eb4fc32ab1c7fafa8df657fdb352339d6b597e04cffc0e7

Malware Config

Targets

    • Target

      look_presentation_s4u.js

    • Size

      1.4MB

    • MD5

      a7f767779dd68f33392a2162ff9392d6

    • SHA1

      4c78f182d039cdf20c8d569ff6f6410d0bca7c50

    • SHA256

      44f7552b9707171e3b0e9f7ce8fbca5aee06ad5e47787cbaf5c8ec78134db687

    • SHA512

      f2bb65dcad91a71f9b7a0ecc1db59ed19024549b279546c384b266a0ad430a2b9697e3aaf6a38e511eb4fc32ab1c7fafa8df657fdb352339d6b597e04cffc0e7

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Ursnif, Dreambot

      Ursnif is a variant of the Gozi IFSB with more capabilities.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks