Resubmissions

24-08-2021 15:04

210824-nsbf1ebs56 10

27-07-2021 08:55

210727-2d8acwdeyx 10

Analysis

  • max time kernel
    71s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    27-07-2021 08:55

General

  • Target

    direction.dll

  • Size

    252KB

  • MD5

    499200f6a8e223c057c6e16701740721

  • SHA1

    ef46f9c62b94715b750173074c51100285ff6fe9

  • SHA256

    d7e64f8e65ce586ce2f0a857810b2a23f85140bf5e52e5a824f09787fb2bf45e

  • SHA512

    b32e3c480c7533d6fa745b3d22bf7d7bed1d0f52452b77c8232560e3d3e8979db53e0e45eb47e81757b6f20cfa01b20c55d5e63f423d89666ee74e6c9988a511

Malware Config

Extracted

Family

gozi_ifsb

Botnet

7410

C2

signin.microsoft.com

alliances.bar

allianceline.bar

alliancer.bar

Attributes
  • build

    250206

  • dns_servers

    107.174.86.134

    107.175.127.22

  • exe_type

    loader

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\direction.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\direction.dll
      2⤵
        PID:1984

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1908-60-0x000007FEFC2E1000-0x000007FEFC2E3000-memory.dmp
      Filesize

      8KB

    • memory/1984-61-0x0000000000000000-mapping.dmp
    • memory/1984-62-0x0000000075B31000-0x0000000075B33000-memory.dmp
      Filesize

      8KB

    • memory/1984-63-0x0000000000180000-0x0000000000200000-memory.dmp
      Filesize

      512KB

    • memory/1984-64-0x0000000010000000-0x0000000010090000-memory.dmp
      Filesize

      576KB