General

  • Target

    a(2)2.zip

  • Size

    996KB

  • Sample

    230518-sq511acg57

  • MD5

    9de856b9a043f5ce3a0c54be2b8eaf81

  • SHA1

    a541f8daab5671269c8372430a0ea673b9cf1477

  • SHA256

    91f43080ba2e8417a8a04773cacba0b0ef82a9cf6d09399bc2cb53a16161295e

  • SHA512

    4c889e11e0da68d3f05ecc6d51b4d199dacc84c7f8113307770213b340504ea7f7b7ff75a01f742a7c0976193b17a28714558ffb3db95dac06d88168a946429d

  • SSDEEP

    24576:LkoGb+eHTEF6HrVqBOWdb8y2tbF1GfPzCZfyukw/y:h54frVOBdvBzSfhV/y

Malware Config

Extracted

Family

gozi

Botnet

1000

C2

https://bastarka.top

Attributes
  • host_keep_time

    2

  • host_shift_time

    1

  • idle_time

    1

  • request_time

    10

aes.plain

Targets

    • Target

      a(2).msi

    • Size

      1.8MB

    • MD5

      7fc18c44f481a5941e2d068a2cdebe0e

    • SHA1

      11b7d2d7451c80621f657662eb738966e2026098

    • SHA256

      c9b591e9a5ccf5416b94aa3b4fac9bece16fb836d1ae4161dcdae295259e01aa

    • SHA512

      798a262fc73b74ddf19a5d6510aa692c3c083d212e473c3b41148e2261064fafd2e74cb92001bf55e92c15141bda85ead5d79e9f93ddd16738dd073bc3eb37d7

    • SSDEEP

      49152:vpyP2OmJH6g7sJzM+C5JCNS5WPvwaq7m6x:6jJzMUpc

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

3
T1082

Tasks