General

  • Target

    instruct_06.21.doc

  • Size

    45KB

  • Sample

    210618-yn76567zzj

  • MD5

    b21183bab3178f2dcd753e9d079501d4

  • SHA1

    d4bc00863ed58580f568de4152dade19df2e8a08

  • SHA256

    943660aff538730507a4e2feb526a1441024ef48e7aaa4515088c80062658f56

  • SHA512

    1fff8e91407ed20d885e9d309c72d775295993f0dfc7587d37494ca66c8b6d0fe2343f4972db00ffcec5585a331c18cfcebd2c1082639fe01f696c9f9121a958

Malware Config

Extracted

Family

gozi_ifsb

Botnet

6000

C2

authd.feronok.com

app.bighomegl.at

Attributes
  • build

    250204

  • exe_type

    loader

  • server_id

    580

rsa_pubkey.base64
serpent.plain

Targets

    • Target

      instruct_06.21.doc

    • Size

      45KB

    • MD5

      b21183bab3178f2dcd753e9d079501d4

    • SHA1

      d4bc00863ed58580f568de4152dade19df2e8a08

    • SHA256

      943660aff538730507a4e2feb526a1441024ef48e7aaa4515088c80062658f56

    • SHA512

      1fff8e91407ed20d885e9d309c72d775295993f0dfc7587d37494ca66c8b6d0fe2343f4972db00ffcec5585a331c18cfcebd2c1082639fe01f696c9f9121a958

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks