General

  • Target

    e70c80d359f951462fc4dea16d994b9c7a2e829799ca32ef798d12530464b3ba

  • Size

    908KB

  • Sample

    220524-2mr5eaedhj

  • MD5

    d8158627ca1f14c97abcf22013101198

  • SHA1

    21a055504080ed770e955b262b271f8411ff6531

  • SHA256

    e70c80d359f951462fc4dea16d994b9c7a2e829799ca32ef798d12530464b3ba

  • SHA512

    0507f8e63efbb026da21099bdbd8de41c816c3ef2fbe5dc56f96cc49851aa19c37bee6a91021056b8c23289ca7d45051ed79b81ccb00683fafa21dbbafa81a97

Malware Config

Extracted

Family

gozi_rm3

Attributes
  • build

    300854

Extracted

Family

gozi_rm3

Botnet

202004141

C2

https://devicelease.xyz

Attributes
  • build

    300854

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      e70c80d359f951462fc4dea16d994b9c7a2e829799ca32ef798d12530464b3ba

    • Size

      908KB

    • MD5

      d8158627ca1f14c97abcf22013101198

    • SHA1

      21a055504080ed770e955b262b271f8411ff6531

    • SHA256

      e70c80d359f951462fc4dea16d994b9c7a2e829799ca32ef798d12530464b3ba

    • SHA512

      0507f8e63efbb026da21099bdbd8de41c816c3ef2fbe5dc56f96cc49851aa19c37bee6a91021056b8c23289ca7d45051ed79b81ccb00683fafa21dbbafa81a97

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks