General

  • Target

    8e7e061cfbeca37aaa1faf43b7e248fbc53024e5abacd532873fdb7919569c2d

  • Size

    40KB

  • Sample

    201223-2yv4yasxj2

  • MD5

    0286232c6300bea38235739d04845f57

  • SHA1

    b6e6d215790c97f2a401391366750d2ff9ededa9

  • SHA256

    8e7e061cfbeca37aaa1faf43b7e248fbc53024e5abacd532873fdb7919569c2d

  • SHA512

    0c8869392f7d85f50e630706c9e3c32fa68d1ba012ede1aa38cd1ebe467f65ffd2c49dbbb6231f973fef24640a36624c99147ac70d5310f29bb1ca72e496a63f

Malware Config

Targets

    • Target

      8e7e061cfbeca37aaa1faf43b7e248fbc53024e5abacd532873fdb7919569c2d

    • Size

      40KB

    • MD5

      0286232c6300bea38235739d04845f57

    • SHA1

      b6e6d215790c97f2a401391366750d2ff9ededa9

    • SHA256

      8e7e061cfbeca37aaa1faf43b7e248fbc53024e5abacd532873fdb7919569c2d

    • SHA512

      0c8869392f7d85f50e630706c9e3c32fa68d1ba012ede1aa38cd1ebe467f65ffd2c49dbbb6231f973fef24640a36624c99147ac70d5310f29bb1ca72e496a63f

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Ursnif, Dreambot

      Ursnif is a variant of the Gozi IFSB with more capabilities.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

2
T1018

Process Discovery

1
T1057

System Information Discovery

1
T1082

Tasks