General

  • Target

    f2bc968af12f634bae168b66c2a24a12b9d047f082a2f3bc4deed7501bcd1f52

  • Size

    908KB

  • Sample

    220520-hjcqrshdhr

  • MD5

    fc966a7cab851838d7f83cc8fe57e1cb

  • SHA1

    ecd98b2e34a5de7d20dca8833b0aa3b26ce1fbc8

  • SHA256

    f2bc968af12f634bae168b66c2a24a12b9d047f082a2f3bc4deed7501bcd1f52

  • SHA512

    de80d13e3a17f0be625d6531f41357ef4726b7e553d31e861c1c7b93ecb4d0ed31e6f6d32e2b0bc09116af2e3211a40ba2a325a80b302b16bf9a3593a849f794

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300854

Extracted

Family

gozi_rm3

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      f2bc968af12f634bae168b66c2a24a12b9d047f082a2f3bc4deed7501bcd1f52

    • Size

      908KB

    • MD5

      fc966a7cab851838d7f83cc8fe57e1cb

    • SHA1

      ecd98b2e34a5de7d20dca8833b0aa3b26ce1fbc8

    • SHA256

      f2bc968af12f634bae168b66c2a24a12b9d047f082a2f3bc4deed7501bcd1f52

    • SHA512

      de80d13e3a17f0be625d6531f41357ef4726b7e553d31e861c1c7b93ecb4d0ed31e6f6d32e2b0bc09116af2e3211a40ba2a325a80b302b16bf9a3593a849f794

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks