General

  • Target

    30cc93dea91da30e83b99c6bbb3097866c109dd0a8093785c757835a2a3e2a5a

  • Size

    880KB

  • Sample

    210910-jy4cpshga3

  • MD5

    6f412ec4edda76b6263289038177815d

  • SHA1

    a588d36d9ee793a41df51c260af0a6d07a4b3e41

  • SHA256

    30cc93dea91da30e83b99c6bbb3097866c109dd0a8093785c757835a2a3e2a5a

  • SHA512

    9fc907fcc4ec927494e95cd627dfa9178025cc49a1c81c2d7a49f0b4c3fdc640210cac79f43568fd9e9ede36655708f97e6707a370e6d1161cd3f13649c0b683

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300981

Extracted

Family

gozi_rm3

Botnet

202108021

C2

https://haverit.xyz

Attributes
  • build

    300981

  • exe_type

    loader

  • non_target_locale

    RU

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
aes.plain

Targets

    • Target

      30cc93dea91da30e83b99c6bbb3097866c109dd0a8093785c757835a2a3e2a5a

    • Size

      880KB

    • MD5

      6f412ec4edda76b6263289038177815d

    • SHA1

      a588d36d9ee793a41df51c260af0a6d07a4b3e41

    • SHA256

      30cc93dea91da30e83b99c6bbb3097866c109dd0a8093785c757835a2a3e2a5a

    • SHA512

      9fc907fcc4ec927494e95cd627dfa9178025cc49a1c81c2d7a49f0b4c3fdc640210cac79f43568fd9e9ede36655708f97e6707a370e6d1161cd3f13649c0b683

MITRE ATT&CK Enterprise v6

Tasks