General

  • Target

    950877d2f56ae662d99268e36a0b6e561ade63ede6e81bd0cbe909e5df5f3164

  • Size

    880KB

  • Sample

    210910-jy7ecshga4

  • MD5

    8ceb653e7a0794bf97778664a7f28c7b

  • SHA1

    5337356ce3014d024ff323e12dedac99df948898

  • SHA256

    950877d2f56ae662d99268e36a0b6e561ade63ede6e81bd0cbe909e5df5f3164

  • SHA512

    d891b5e329f72015ef86e9e34199df3cc42d4eb877ec571efa3157c63b856efe5e842d80807e773ea0d22e3ea0f320fde5558c7e1ae2b9a9ef0b8f508e0a97cc

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300981

Extracted

Family

gozi_rm3

Botnet

202108021

C2

https://haverit.xyz

Attributes
  • build

    300981

  • exe_type

    loader

  • non_target_locale

    RU

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
aes.plain

Targets

    • Target

      950877d2f56ae662d99268e36a0b6e561ade63ede6e81bd0cbe909e5df5f3164

    • Size

      880KB

    • MD5

      8ceb653e7a0794bf97778664a7f28c7b

    • SHA1

      5337356ce3014d024ff323e12dedac99df948898

    • SHA256

      950877d2f56ae662d99268e36a0b6e561ade63ede6e81bd0cbe909e5df5f3164

    • SHA512

      d891b5e329f72015ef86e9e34199df3cc42d4eb877ec571efa3157c63b856efe5e842d80807e773ea0d22e3ea0f320fde5558c7e1ae2b9a9ef0b8f508e0a97cc

MITRE ATT&CK Enterprise v6

Tasks