Resubmissions

23/03/2022, 11:41

220323-ntlz3sdbf4 10

23/03/2022, 09:48

220323-lswf1sbhf5 10

General

  • Target

    readme

  • Size

    471KB

  • Sample

    220323-ntlz3sdbf4

  • MD5

    fbc2f28e187edcc6ddf89989ff8e591f

  • SHA1

    a322761d2f8eb898810454f545e8646495e98fea

  • SHA256

    77457f0b7da19036041ca3a0071e141909d889eb7e2d28d6ad0df73bc3c81636

  • SHA512

    6d04490602f0239dc823a5640793f5415597a70682d64b1620ae5006a351c70e232cb5c024caf2eff2ef2527d22ed321687dcde94b00877f8ecfc9ba788ae0de

Malware Config

Extracted

Family

gozi_ifsb

Botnet

7627

C2

vilogerta.top

linkspremium.ru

premiumlists.ru

Attributes
  • base_path

    /drew/

  • build

    250225

  • exe_type

    loader

  • extension

    .jlk

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      readme

    • Size

      471KB

    • MD5

      fbc2f28e187edcc6ddf89989ff8e591f

    • SHA1

      a322761d2f8eb898810454f545e8646495e98fea

    • SHA256

      77457f0b7da19036041ca3a0071e141909d889eb7e2d28d6ad0df73bc3c81636

    • SHA512

      6d04490602f0239dc823a5640793f5415597a70682d64b1620ae5006a351c70e232cb5c024caf2eff2ef2527d22ed321687dcde94b00877f8ecfc9ba788ae0de

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Registers COM server for autorun

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks