General

  • Target

    SecuriteInfo.com.Win32.Kryptik.HJSQ.12709.32696

  • Size

    197KB

  • Sample

    210316-4cthsmzpys

  • MD5

    5d600596afcd9e9ee6767ca449257581

  • SHA1

    c4d359789bdc0066f2ca4b4e383cb18a5d8d2f7f

  • SHA256

    eb5d21b247b7552956d9ed05df2de0f366835db3977c18291b65fdb876897126

  • SHA512

    f111033343cfbd543d83de05b61d3ff605eae86d35093e00e10146b87663df6793410d37c84b577dd737bf708097678f44785079518817a5c14ecc73f396c5a3

Malware Config

Extracted

Family

gozi_ifsb

Botnet

3300

C2

api10.laptok.at/api1

golang.feel500.at/api1

go.in100k.at/api1

Attributes
  • build

    250180

  • exe_type

    loader

  • server_id

    730

rsa_pubkey.base64
serpent.plain

Targets

    • Target

      SecuriteInfo.com.Win32.Kryptik.HJSQ.12709.32696

    • Size

      197KB

    • MD5

      5d600596afcd9e9ee6767ca449257581

    • SHA1

      c4d359789bdc0066f2ca4b4e383cb18a5d8d2f7f

    • SHA256

      eb5d21b247b7552956d9ed05df2de0f366835db3977c18291b65fdb876897126

    • SHA512

      f111033343cfbd543d83de05b61d3ff605eae86d35093e00e10146b87663df6793410d37c84b577dd737bf708097678f44785079518817a5c14ecc73f396c5a3

MITRE ATT&CK Matrix

Tasks