Analysis

  • max time kernel
    151s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 15:58

General

  • Target

    portfolio.exe

  • Size

    215KB

  • MD5

    f7a4f0c3ab59531900a3981d820712c8

  • SHA1

    49d89476d455d0fc1e551cfd24fc52064665eb2f

  • SHA256

    573ecacb1ccfd4965e899ed3bb811181bf78b62399e10a5690491eb199e0291c

  • SHA512

    3f0af683de2030de0d2eafd3ca3f640219bdff95a72c3e674cbbe9ced28acecee12b8de89769a97ee1ece2244cb0394553157465e9ae054e02e393a3ec3477fd

  • SSDEEP

    3072:JAXvvaPHPHLlRxKM+6XrgGHT4SW4NsnGC4EN/kMBsupYX9c5T1STtyl:yvv4HPHLXEM+6JHT4+WlkgQ41STk

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

https://avas1ta.com/in/login/

192.121.22.216

http://mimemoa.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

Processes

  • C:\Users\Admin\AppData\Local\Temp\portfolio.exe
    "C:\Users\Admin\AppData\Local\Temp\portfolio.exe"
    1⤵
      PID:5040

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5040-0-0x0000000000510000-0x0000000000525000-memory.dmp

      Filesize

      84KB

    • memory/5040-1-0x0000000000530000-0x000000000053B000-memory.dmp

      Filesize

      44KB

    • memory/5040-2-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/5040-3-0x0000000000630000-0x000000000063D000-memory.dmp

      Filesize

      52KB

    • memory/5040-6-0x0000000000400000-0x0000000000486000-memory.dmp

      Filesize

      536KB

    • memory/5040-7-0x0000000000510000-0x0000000000525000-memory.dmp

      Filesize

      84KB

    • memory/5040-8-0x0000000000530000-0x000000000053B000-memory.dmp

      Filesize

      44KB