General

  • Target

    dokument9055.vbs

  • Size

    1.6MB

  • Sample

    231024-ql7mxsdb4y

  • MD5

    bd22583a3b419a9acb7db67008e77a3c

  • SHA1

    eed1bcd586d3b830fdd27d5cf76927db629bf1c0

  • SHA256

    98b3160c553c229cb9be77de3791398aed3cce79e7935d96db9e32bf353b9624

  • SHA512

    20a1b73be43366be9d58786ecc94025cb6ec4944c6d72c830cfebb37d9dc0de48841020dca3aff4d021de03fb557ef7b1be044b99101529e7a46f1e5ed60c0d2

  • SSDEEP

    24576:pv52a7mOdpmQZ4b89zDO27CN1EqR/8mRlwRlHXufAkj9UNgEBSx53q:pv52umQz627KEcIN2Ac90BI53q

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1000

C2

http://ey7kuuklgieop2pq.onion

http://news-deck.at

http://taslks.at

http://living-start.at

http://ali-express1.at

Attributes
  • build

    217107

  • dga_base_url

    constitution.org/usdeclar.txt

  • dga_crc

    0x4eb7d2ca

  • dga_season

    10

  • dga_tlds

    com

    ru

    org

  • exe_type

    worker

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      dokument9055.vbs

    • Size

      1.6MB

    • MD5

      bd22583a3b419a9acb7db67008e77a3c

    • SHA1

      eed1bcd586d3b830fdd27d5cf76927db629bf1c0

    • SHA256

      98b3160c553c229cb9be77de3791398aed3cce79e7935d96db9e32bf353b9624

    • SHA512

      20a1b73be43366be9d58786ecc94025cb6ec4944c6d72c830cfebb37d9dc0de48841020dca3aff4d021de03fb557ef7b1be044b99101529e7a46f1e5ed60c0d2

    • SSDEEP

      24576:pv52a7mOdpmQZ4b89zDO27CN1EqR/8mRlwRlHXufAkj9UNgEBSx53q:pv52umQz627KEcIN2Ac90BI53q

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks