Resubmissions

15-09-2021 08:02

210915-jxlq9sdcap 10

21-06-2021 14:09

210621-9vqvyrxbas 10

General

  • Target

    ordain.06.21.2021.doc

  • Size

    49KB

  • Sample

    210621-9vqvyrxbas

  • MD5

    13731c9cb360c300137bcb1779267f41

  • SHA1

    cf816dc25baf65c92550452e3abe7f871af7f55a

  • SHA256

    89816b893e66ff5eb9a42c14a2223e451e178c944438365ccecc9a8d1d64e6e8

  • SHA512

    819e65feef603801ef28fd17a986085df277e5cb36c701a2471c00a4714ce51e376f4644ff9c264222bd35ec7192d4f62675673570a8633e330d337b921c1756

Malware Config

Extracted

Family

gozi_ifsb

Botnet

6000

C2

authd.feronok.com

app.bighomegl.at

Attributes
  • build

    250204

  • exe_type

    loader

  • server_id

    580

rsa_pubkey.base64
serpent.plain

Targets

    • Target

      ordain.06.21.2021.doc

    • Size

      49KB

    • MD5

      13731c9cb360c300137bcb1779267f41

    • SHA1

      cf816dc25baf65c92550452e3abe7f871af7f55a

    • SHA256

      89816b893e66ff5eb9a42c14a2223e451e178c944438365ccecc9a8d1d64e6e8

    • SHA512

      819e65feef603801ef28fd17a986085df277e5cb36c701a2471c00a4714ce51e376f4644ff9c264222bd35ec7192d4f62675673570a8633e330d337b921c1756

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks