General

  • Target

    54d0124f0b2197d0b7f6f87024d4e581c7b472eff9f87ecfa93b9a1603410e71_JC.zip

  • Size

    8KB

  • Sample

    231007-mnajesdb56

  • MD5

    2e21886757a53b7ad520489d963bfa16

  • SHA1

    6e60f0d9ac8b3e1419ab638faa673a15b240e755

  • SHA256

    54d0124f0b2197d0b7f6f87024d4e581c7b472eff9f87ecfa93b9a1603410e71

  • SHA512

    c02db50718776a1e2e5c9c2d347bfe0afa605673fd8a6ff6e9ccf169a5630ba4ca7fca6a39fbe929a35559458bf87da8ce771c6d4c1acbb6fecfe55905a9414f

  • SSDEEP

    192:RIqSXPCQ6Ol3XtyzlIg4EG5TkIESnATwI10PBhjBt4EFkLhr3zSf:cXPCAilI24kIHOwI4BbADmf

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://communicalink.com/index.php

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      client_5.hta

    • Size

      22KB

    • MD5

      988f8a03ac893e41d4f9aaca5addafe1

    • SHA1

      d3bda7e7be11da19cd3adf16a4c58548eb573f74

    • SHA256

      0389108b0322ecbbadd21a245c1b75f93e38a2e51a8b38a385596ebe05c323cf

    • SHA512

      2dd80008e91d35da4d60572be008ab60ae7edd5ebe5b94518c3bfb3aa573c812e2abeb3c7d4033ca9cf5b99e64db5537c79b3e6aae8bd89e894de7fcc2a5b1c1

    • SSDEEP

      384:pA7lUDQMeK43MV0p6WUuJOJjmF9Koq5nZN851z9fwP3jXMeSnqIc6l:H2MWqwRwPDd6l

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks