General

  • Target

    SHCSdw.dll

  • Size

    1.2MB

  • Sample

    220706-pnd8qaefg4

  • MD5

    e1efcb20eb94e7efd89990c1d7d68370

  • SHA1

    8d15a27d08de0ff196790c7ea375011454bc77b1

  • SHA256

    bc8da5ad4010226376c376b2d164cfa4e073a0f6ef7761e9f4864a46a8cb9b32

  • SHA512

    2f5659782b0a8de6b8f0c16ad619769822b6dc2a639a0d6c1f62559f61722c4aa41c787c6b94b2e0674fce772477dd2b6943b471841e9ac202cdcc6ee77e7f3e

Malware Config

Extracted

Family

gozi_ifsb

Botnet

1000

C2

http://ey7kuuklgieop2pq.onion

http://news-deck.at

http://taslks.at

http://living-start.at

http://ali-express1.at

Attributes
  • build

    217107

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      SHCSdw.dll

    • Size

      1.2MB

    • MD5

      e1efcb20eb94e7efd89990c1d7d68370

    • SHA1

      8d15a27d08de0ff196790c7ea375011454bc77b1

    • SHA256

      bc8da5ad4010226376c376b2d164cfa4e073a0f6ef7761e9f4864a46a8cb9b32

    • SHA512

      2f5659782b0a8de6b8f0c16ad619769822b6dc2a639a0d6c1f62559f61722c4aa41c787c6b94b2e0674fce772477dd2b6943b471841e9ac202cdcc6ee77e7f3e

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks