General

  • Target

    d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73

  • Size

    359KB

  • Sample

    221029-depsbaaaen

  • MD5

    a5d00f4f2dc2a70f41f9078e954fa3f7

  • SHA1

    66c366e18ad670127108367df79398f524de28c3

  • SHA256

    d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73

  • SHA512

    62d0d67923bd1d3ee55377a5c97beae3bc89a22abba1497710261a60514e104c657b4635286c320e6510416ba678a2bd8aa62c97095c3807ed28935bdf6be8ee

  • SSDEEP

    6144:WiYJpJ1cY/d6fV7QTBpbbFzYyIHuoEUOckLiVfxbW3y2BNmm8:uJr9l65QTbbb93GuoExHLiVfeNx

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1010

C2

lan.hayloindigo.com/geodata/version/ip2ext

sys.jacentacobb.com/geodata/version/ip2ext

bot.wakeandbakealldaylong.com/geodata/version/ip2ext

adm.cutmedic.com/geodata/version/ip2ext

lansystemstat.com/geodata/version/ip2ext

highnetwork.pw/geodata/version/ip2ext

lostnetwork.in/geodata/version/ip2ext

sysconnections.net/geodata/version/ip2ext

lansupports.com/geodata/version/ip2ext

Attributes
  • exe_type

    worker

  • server_id

    30

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73

    • Size

      359KB

    • MD5

      a5d00f4f2dc2a70f41f9078e954fa3f7

    • SHA1

      66c366e18ad670127108367df79398f524de28c3

    • SHA256

      d85a9488a8042b3dd5fef96447ad97ce13be651ff44e61ef169983262c3fcf73

    • SHA512

      62d0d67923bd1d3ee55377a5c97beae3bc89a22abba1497710261a60514e104c657b4635286c320e6510416ba678a2bd8aa62c97095c3807ed28935bdf6be8ee

    • SSDEEP

      6144:WiYJpJ1cY/d6fV7QTBpbbFzYyIHuoEUOckLiVfxbW3y2BNmm8:uJr9l65QTbbb93GuoExHLiVfeNx

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

2
T1089

Modify Registry

3
T1112

Discovery

System Information Discovery

1
T1082

Tasks