General

  • Target

    1e10a5d25440db4c0e1cbfcc350f920eb076042e9d4fcb625d4d950bdf694e84

  • Size

    908KB

  • Sample

    220524-1g342scgfj

  • MD5

    1bd00137d87a9c9fa424d6ef4ad0f8e4

  • SHA1

    8f7aebc7e54f64da68aa93ca069d77296e396a1f

  • SHA256

    1e10a5d25440db4c0e1cbfcc350f920eb076042e9d4fcb625d4d950bdf694e84

  • SHA512

    3c043b554692ab5df4f3e9d022f7e6b595cdc1b1fc226080aa1cc3bfe42dad5b6ddc99f4f1bad40365903232ab35866a384a216d494962867b054fbc70b536e5

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300854

Extracted

Family

gozi_rm3

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      1e10a5d25440db4c0e1cbfcc350f920eb076042e9d4fcb625d4d950bdf694e84

    • Size

      908KB

    • MD5

      1bd00137d87a9c9fa424d6ef4ad0f8e4

    • SHA1

      8f7aebc7e54f64da68aa93ca069d77296e396a1f

    • SHA256

      1e10a5d25440db4c0e1cbfcc350f920eb076042e9d4fcb625d4d950bdf694e84

    • SHA512

      3c043b554692ab5df4f3e9d022f7e6b595cdc1b1fc226080aa1cc3bfe42dad5b6ddc99f4f1bad40365903232ab35866a384a216d494962867b054fbc70b536e5

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks