General

  • Target

    e36d09b617f45d7385e0794e3f18fe30bb02422bb4c6683ded46511e1ed8720a

  • Size

    343KB

  • Sample

    221123-s8ea1agd3x

  • MD5

    efffda899619ba79597af406f787b787

  • SHA1

    5be622a908bc2d5fc00e45deaff65bd6b736d316

  • SHA256

    e36d09b617f45d7385e0794e3f18fe30bb02422bb4c6683ded46511e1ed8720a

  • SHA512

    250746da9cd78f0a12bb42c54f99b3c032e1c856c68805afc7d7d2613a74d94b180713e390e708929d7755dede1b394ade80bf0744c9ca4023b49362ba536a75

  • SSDEEP

    3072:CSJKYEGt6CHPwD4ineRY/LE/iiSfgNxi5wOFxhRjhrEYkE10xc9XhMXYaVYigu8u:34YEGhHA4qTE6Da0FhrTOxc9XhJu8u

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1000

C2

organfriandpopul.su/bbr_src/utilites/xxx

alrthesecuritywith.su/bbr_src/utilites/xxx

circumstanceshave.su/bbr_src/utilites/xxx

Attributes
  • exe_type

    worker

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      e36d09b617f45d7385e0794e3f18fe30bb02422bb4c6683ded46511e1ed8720a

    • Size

      343KB

    • MD5

      efffda899619ba79597af406f787b787

    • SHA1

      5be622a908bc2d5fc00e45deaff65bd6b736d316

    • SHA256

      e36d09b617f45d7385e0794e3f18fe30bb02422bb4c6683ded46511e1ed8720a

    • SHA512

      250746da9cd78f0a12bb42c54f99b3c032e1c856c68805afc7d7d2613a74d94b180713e390e708929d7755dede1b394ade80bf0744c9ca4023b49362ba536a75

    • SSDEEP

      3072:CSJKYEGt6CHPwD4ineRY/LE/iiSfgNxi5wOFxhRjhrEYkE10xc9XhMXYaVYigu8u:34YEGhHA4qTE6Da0FhrTOxc9XhJu8u

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks