General

  • Target

    7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1

  • Size

    298KB

  • Sample

    220731-lvyzxsaee9

  • MD5

    ac9c437a379f66b5a5a054f8fa2f879a

  • SHA1

    53cfe57f0e419e62b78cf058f955903c7b34d45c

  • SHA256

    7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1

  • SHA512

    465af8ccba10b71c847291806015e12e30cbd96e528b615d89e8f9472e8d14320287c2a32eccb2f7abf3c06a31d0edc4eed1ad047834c43fb0b3b0bc3bcf1cdf

Malware Config

Extracted

Family

gozi_ifsb

Botnet

2000

C2

has.votaritar.at/webstore

Attributes
  • build

    217099

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • dns_servers

    8.8.8.8

    195.10.195.195

    8.8.4.4

    95.216.174.175

    193.30.123.44

    94.247.43.254

  • exe_type

    loader

  • server_id

    550

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1

    • Size

      298KB

    • MD5

      ac9c437a379f66b5a5a054f8fa2f879a

    • SHA1

      53cfe57f0e419e62b78cf058f955903c7b34d45c

    • SHA256

      7943875b4482c8893854ef9b127b995270fe365be81d0db978b3937811c68bd1

    • SHA512

      465af8ccba10b71c847291806015e12e30cbd96e528b615d89e8f9472e8d14320287c2a32eccb2f7abf3c06a31d0edc4eed1ad047834c43fb0b3b0bc3bcf1cdf

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks