General

  • Target

    c7bd7e87cec42d5908d43a54dbe58d7fdf1ead0b595d705cc9102883a5aac5a5

  • Size

    880KB

  • Sample

    210910-hw1clacgcl

  • MD5

    eb9fc4102827c5f9316bc5f353ba4f8c

  • SHA1

    9022b64fe2f8e2532cd9480edc53bb623f881579

  • SHA256

    c7bd7e87cec42d5908d43a54dbe58d7fdf1ead0b595d705cc9102883a5aac5a5

  • SHA512

    c03bd4ba73459ef573445c346dc73645de5035577940a0cf8f5331e502e76634e164c2e16e7482ff876976e901d14795586b80666ec6d885e85fa8aa4b6641a3

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300981

Extracted

Family

gozi_rm3

Botnet

202108021

C2

https://haverit.xyz

Attributes
  • build

    300981

  • exe_type

    loader

  • non_target_locale

    RU

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
aes.plain

Targets

    • Target

      c7bd7e87cec42d5908d43a54dbe58d7fdf1ead0b595d705cc9102883a5aac5a5

    • Size

      880KB

    • MD5

      eb9fc4102827c5f9316bc5f353ba4f8c

    • SHA1

      9022b64fe2f8e2532cd9480edc53bb623f881579

    • SHA256

      c7bd7e87cec42d5908d43a54dbe58d7fdf1ead0b595d705cc9102883a5aac5a5

    • SHA512

      c03bd4ba73459ef573445c346dc73645de5035577940a0cf8f5331e502e76634e164c2e16e7482ff876976e901d14795586b80666ec6d885e85fa8aa4b6641a3

MITRE ATT&CK Enterprise v6

Tasks