General
-
Target
client_1.hta
-
Size
22KB
-
Sample
231008-xyzamsfd71
-
MD5
57d3eb665f1e9e6a19f278baabd49e7b
-
SHA1
44566a9d716e6abd0304544dd88d245fea990882
-
SHA256
4380de3cba18880ef72d2bc73ec84ee6f9f27b55d635a81ab8d40d488f59303d
-
SHA512
30a0a3349aa0b815728abdb0c770d65354cdcf68ca939de4c175bdb285e3d664d7afdddc4be91bae170a65e4f808e6de7cc877fa36442f64f7b7db993e83851d
-
SSDEEP
384:rO6BO5aa8mOFhyS1q5H8qxAt4VFhmqmfW9PW6vN1v35Zh5LaBY5E6bqBdOfF:4zS0kPWVN5LbtcOfF
Static task
static1
Behavioral task
behavioral1
Sample
client_1.hta
Resource
win7-20230831-en
Malware Config
Extracted
http://communicalink.com/index.php
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
http://igrovdow.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Targets
-
-
Target
client_1.hta
-
Size
22KB
-
MD5
57d3eb665f1e9e6a19f278baabd49e7b
-
SHA1
44566a9d716e6abd0304544dd88d245fea990882
-
SHA256
4380de3cba18880ef72d2bc73ec84ee6f9f27b55d635a81ab8d40d488f59303d
-
SHA512
30a0a3349aa0b815728abdb0c770d65354cdcf68ca939de4c175bdb285e3d664d7afdddc4be91bae170a65e4f808e6de7cc877fa36442f64f7b7db993e83851d
-
SSDEEP
384:rO6BO5aa8mOFhyS1q5H8qxAt4VFhmqmfW9PW6vN1v35Zh5LaBY5E6bqBdOfF:4zS0kPWVN5LbtcOfF
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-