General

  • Target

    a248997a8b79c2b5f7a411e4c0884439eabffc62c8f3bcdbf7ba5ecb2871e7c7_JC.url

  • Size

    193B

  • Sample

    230929-sd17aacc8v

  • MD5

    c7b74d8d06b8b318128bb6e00801fbdd

  • SHA1

    4ae90bf447e5d73a4f11b1328b7b37873fddba1c

  • SHA256

    a248997a8b79c2b5f7a411e4c0884439eabffc62c8f3bcdbf7ba5ecb2871e7c7

  • SHA512

    df09afdd6f9c4cf7f7e2ee19150aacf05a81d3c46d8563b48b103597289d972295c07cc5ce3303c4f0d0df7d7b3dfccd33f9a4eee68807a8debdde853d9a6b93

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

netsecurez.com

whofoxy.com

mimemoa.com

ntcgo.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

31.41.44.79

185.248.144.203

netsecurez.com

whofoxy.com

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      a248997a8b79c2b5f7a411e4c0884439eabffc62c8f3bcdbf7ba5ecb2871e7c7_JC.url

    • Size

      193B

    • MD5

      c7b74d8d06b8b318128bb6e00801fbdd

    • SHA1

      4ae90bf447e5d73a4f11b1328b7b37873fddba1c

    • SHA256

      a248997a8b79c2b5f7a411e4c0884439eabffc62c8f3bcdbf7ba5ecb2871e7c7

    • SHA512

      df09afdd6f9c4cf7f7e2ee19150aacf05a81d3c46d8563b48b103597289d972295c07cc5ce3303c4f0d0df7d7b3dfccd33f9a4eee68807a8debdde853d9a6b93

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks