General

  • Target

    2200.dll

  • Size

    380KB

  • Sample

    210302-1aeb4a8vln

  • MD5

    649b5c913739cea195c7662ff412b8ce

  • SHA1

    0f727f35cded239371681678545328a25014c92e

  • SHA256

    b725a6e174cd448a720f179599290d3f014fd2d1521b8de1ddcf28193ba8d09f

  • SHA512

    009740ff83446711a414e158abf8957108733bfdd9037503a0767f0885ed71c09695fa6f200c2eb0aec1d161ba31f09b508b86b1c6652dc3c35196169dd30886

Malware Config

Extracted

Family

gozi_ifsb

Botnet

2200

C2

api10.laptok.at/api1

golang.feel500.at/api1

go.in100k.at/api1

Attributes
  • build

    250180

  • exe_type

    loader

  • server_id

    730

rsa_pubkey.base64
serpent.plain

Targets

    • Target

      2200.dll

    • Size

      380KB

    • MD5

      649b5c913739cea195c7662ff412b8ce

    • SHA1

      0f727f35cded239371681678545328a25014c92e

    • SHA256

      b725a6e174cd448a720f179599290d3f014fd2d1521b8de1ddcf28193ba8d09f

    • SHA512

      009740ff83446711a414e158abf8957108733bfdd9037503a0767f0885ed71c09695fa6f200c2eb0aec1d161ba31f09b508b86b1c6652dc3c35196169dd30886

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks