General

  • Target

    Cliente.zip

  • Size

    320B

  • Sample

    231012-rezjeadc9t

  • MD5

    326843585860553511ef01e762f6f802

  • SHA1

    efe4227588ac122273a83960573d6af5ee3dd17d

  • SHA256

    b9bff5d55153184ceef31bf335fafb425fe512fe8f702e072bb1fd377493abd8

  • SHA512

    f8b034f60cf5d52fac2f87ed35c3d1b49f96a8a500ec8b341fe65be3747c6fdcbd69291449c93d84c6c8ff8add8f82e73979e2a1992546c8dc58982af4828b87

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Extracted

Family

gozi

Botnet

5050

C2

fotexion.com

Attributes
  • base_path

    /pictures/

  • build

    250260

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      Cliente.url

    • Size

      194B

    • MD5

      0da2f6812c1bc76eaa25be1e6a2eaf4c

    • SHA1

      e4b237e5f7bb7b96e9bfb43c126541fc892d3b0a

    • SHA256

      0042887574aae1f954f0459b9448c0fa4501bb8719843940315d466645da9a7b

    • SHA512

      a5495580fae00444b4edbff6894e1e302025ddff295a26fe519bc229724d3961646afb1cece2be892b19840035152a937fa3f7910e4fe04adea751eb319d96cb

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks