General

  • Target

    textual.dll

  • Size

    590KB

  • Sample

    210623-ap6yqcdsps

  • MD5

    f1daeecad06895db6b2c94f7eb1028a1

  • SHA1

    12713fcec29130f2baefac245b30b4686ed7bb9b

  • SHA256

    c7ba05674f44747d5685f36313fc0a77bc5afea3035fa0d14ee2f4dbfbcbff5c

  • SHA512

    b0e17110cc4749e15b5659aa6aa542286c9617ae291f5666b48131ad73fc4e6de1e61d4a4a8b163093ff41d3ec8ea05bb491bac17e20d9a0574acd912e44d6c0

Malware Config

Extracted

Family

gozi_ifsb

Botnet

4500

C2

authd.feronok.com

app.bighomegl.at

Attributes
  • build

    250204

  • exe_type

    loader

  • server_id

    580

rsa_pubkey.base64
serpent.plain

Targets

    • Target

      textual.dll

    • Size

      590KB

    • MD5

      f1daeecad06895db6b2c94f7eb1028a1

    • SHA1

      12713fcec29130f2baefac245b30b4686ed7bb9b

    • SHA256

      c7ba05674f44747d5685f36313fc0a77bc5afea3035fa0d14ee2f4dbfbcbff5c

    • SHA512

      b0e17110cc4749e15b5659aa6aa542286c9617ae291f5666b48131ad73fc4e6de1e61d4a4a8b163093ff41d3ec8ea05bb491bac17e20d9a0574acd912e44d6c0

MITRE ATT&CK Matrix

Tasks