General

  • Target

    5949348fedecc598cdbce7072639231f.exe

  • Size

    61KB

  • Sample

    221013-hjl97sbabq

  • MD5

    5949348fedecc598cdbce7072639231f

  • SHA1

    a9a614ecb4871b57da47b32ce572c46493de6897

  • SHA256

    2fffec7d345d16c2480ea2f3f2e046e220488486c81cf7e1c14adfab890ec0b1

  • SHA512

    c77b39d9ec27bbcf6b859defc292f05edb1a2350f90961c7ec1778a5be515fdf053222a1871f7c99b8c2cb2ac25205f6efd55b16ea1a32ecdab016d1a51ff3fb

  • SSDEEP

    768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6RzUhSC:AdMzAzjavO9uG+NNdQ4MGQRwv

Malware Config

Extracted

Family

raccoon

Botnet

b3ca3fc91779633a47981045668e09c4

C2

http://188.127.227.51/

rc4.plain

Extracted

Family

gozi_ifsb

Botnet

10103

C2

trackingg-protectioon.cdn1.mozilla.net

45.8.158.104

188.127.224.114

weiqeqwns.com

wdeiqeqwns.com

weiqeqwens.com

weiqewqwns.com

iujdhsndjfks.com

Attributes
  • base_path

    /uploaded/

  • build

    250246

  • exe_type

    loader

  • extension

    .pct

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      5949348fedecc598cdbce7072639231f.exe

    • Size

      61KB

    • MD5

      5949348fedecc598cdbce7072639231f

    • SHA1

      a9a614ecb4871b57da47b32ce572c46493de6897

    • SHA256

      2fffec7d345d16c2480ea2f3f2e046e220488486c81cf7e1c14adfab890ec0b1

    • SHA512

      c77b39d9ec27bbcf6b859defc292f05edb1a2350f90961c7ec1778a5be515fdf053222a1871f7c99b8c2cb2ac25205f6efd55b16ea1a32ecdab016d1a51ff3fb

    • SSDEEP

      768:G3hBdh98zo8hUzAMgRt5O9hDtqCD+4yNdQiEw6ZjqZeS6RzUhSC:AdMzAzjavO9uG+NNdQ4MGQRwv

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks