General

  • Target

    5fc612703f844.dll

  • Size

    122KB

  • Sample

    201201-sf94h51asx

  • MD5

    897285413e9a2bc5207996e43432078f

  • SHA1

    0da15676430232150a2b2d5b7b9a2cf19d7b3306

  • SHA256

    99b6752f4009fd4bbf0c62cf0f30285fbf28bbdd3c5b7fee0bf1b7fe20a8a406

  • SHA512

    20c986925305276ff52746e0cd8081d8174251e0392ed355a48d94d7febdd5c6955998d9255594b146926bf66886de067a0f942f34ab75b5f1f302794149c9d1

Malware Config

Targets

    • Target

      5fc612703f844.dll

    • Size

      122KB

    • MD5

      897285413e9a2bc5207996e43432078f

    • SHA1

      0da15676430232150a2b2d5b7b9a2cf19d7b3306

    • SHA256

      99b6752f4009fd4bbf0c62cf0f30285fbf28bbdd3c5b7fee0bf1b7fe20a8a406

    • SHA512

      20c986925305276ff52746e0cd8081d8174251e0392ed355a48d94d7febdd5c6955998d9255594b146926bf66886de067a0f942f34ab75b5f1f302794149c9d1

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Ursnif, Dreambot

      Ursnif is a variant of the Gozi IFSB with more capabilities.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Remote System Discovery

2
T1018

Process Discovery

1
T1057

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks