General

  • Target

    160c92e29ab055826aac2ee96c01d5a1f89472efcabbb0ded6337e2bb88fb669

  • Size

    908KB

  • Sample

    220520-hk6egaeef8

  • MD5

    eb753a9b0e9109b1f85fb0073f0eaece

  • SHA1

    07c41daff15bbf09a6c107d2e9428e2570044558

  • SHA256

    160c92e29ab055826aac2ee96c01d5a1f89472efcabbb0ded6337e2bb88fb669

  • SHA512

    95967abf33826e66abe9eecb75adc968115e131f2c197cd315416664020e47cc59e6b1bdf6f9dfe390dd03b11fec8f9ac0ffecaa1c15f9150bb58e79dcd64577

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300854

Extracted

Family

gozi_rm3

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      160c92e29ab055826aac2ee96c01d5a1f89472efcabbb0ded6337e2bb88fb669

    • Size

      908KB

    • MD5

      eb753a9b0e9109b1f85fb0073f0eaece

    • SHA1

      07c41daff15bbf09a6c107d2e9428e2570044558

    • SHA256

      160c92e29ab055826aac2ee96c01d5a1f89472efcabbb0ded6337e2bb88fb669

    • SHA512

      95967abf33826e66abe9eecb75adc968115e131f2c197cd315416664020e47cc59e6b1bdf6f9dfe390dd03b11fec8f9ac0ffecaa1c15f9150bb58e79dcd64577

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks