General

  • Target

    2cd9bc76624eebb8dd89600ca372b1de083a96d8e868eda0e974a7b2f58fc14e

  • Size

    851KB

  • Sample

    220614-1axnpahgf8

  • MD5

    356803d58538c6e67cba97dc1cf50021

  • SHA1

    56a643fd5d4b927cad2b5c7cf9c92103d426344c

  • SHA256

    2cd9bc76624eebb8dd89600ca372b1de083a96d8e868eda0e974a7b2f58fc14e

  • SHA512

    c05207089b1dd8ccd65268e9b2aa948f2df3a2c1d0f714ca24326a27a62fbdcb3fdf4214213c89f781d130850c8ff38422e407f7f807231436956fdc00b5d465

Malware Config

Extracted

Family

gozi_ifsb

Botnet

92

C2

http://aaxvkah7dudzoloq.onion

http://mashallah.at

http://anumal-planet.at

Attributes
  • build

    217027

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      2cd9bc76624eebb8dd89600ca372b1de083a96d8e868eda0e974a7b2f58fc14e

    • Size

      851KB

    • MD5

      356803d58538c6e67cba97dc1cf50021

    • SHA1

      56a643fd5d4b927cad2b5c7cf9c92103d426344c

    • SHA256

      2cd9bc76624eebb8dd89600ca372b1de083a96d8e868eda0e974a7b2f58fc14e

    • SHA512

      c05207089b1dd8ccd65268e9b2aa948f2df3a2c1d0f714ca24326a27a62fbdcb3fdf4214213c89f781d130850c8ff38422e407f7f807231436956fdc00b5d465

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks