General

  • Target

    3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

  • Size

    361KB

  • Sample

    220625-hcxglahfcl

  • MD5

    1e4e3ab0d662c3f8a47c67ed427a154f

  • SHA1

    c96cf36141dd1a2a88bcaf3881f233a40854fb2b

  • SHA256

    3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

  • SHA512

    879ac733fc2cfd57561ce65a92bab41d47484da3b7e7e2c430359bfa0301f1f3fcf253d181ed1bc7fbf20861b35cdc871acc9cf461909e69936fadaa58c4936e

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1010

C2

diuolirt.at

deopliazae.at

nifredao.com

filokiyurt.at

Attributes
  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

    • Size

      361KB

    • MD5

      1e4e3ab0d662c3f8a47c67ed427a154f

    • SHA1

      c96cf36141dd1a2a88bcaf3881f233a40854fb2b

    • SHA256

      3a25ac74307f2358212c1cf753a9ae3ff548737ee6c6c0a789ca07464038bb5a

    • SHA512

      879ac733fc2cfd57561ce65a92bab41d47484da3b7e7e2c430359bfa0301f1f3fcf253d181ed1bc7fbf20861b35cdc871acc9cf461909e69936fadaa58c4936e

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks