General

  • Target

    Electron.zip

  • Size

    3.9MB

  • Sample

    231106-tspmgacd2s

  • MD5

    e4f7021381d73388b2ba9ccdff4c7338

  • SHA1

    a2a5451492e95d31d638eab0b380ea668f937d87

  • SHA256

    e89d3160f87ebffc0394b1f40d13795aac1a7187e732f3ae634427d5995f6f92

  • SHA512

    3d5a40a74e38940ec2bfe0cf392b642c91be302d9c3ac2672ebb80f2d64b52613ecce6d20cf8f7ce7f46c66fe620e89468243b7f0156ce1500f1961253675707

  • SSDEEP

    98304:nanflaoWctsuhO1JgyamC5ogHmpdrdDL/K7sZayHZFn1td:nanNLWasTamC5o5drl/JlH31td

Malware Config

Extracted

Family

gozi

Targets

    • Target

      Electron/Electron.exe

    • Size

      4.0MB

    • MD5

      5aad6da9eb1e06fb7a249afc9f4927a8

    • SHA1

      c603222e26d5f43a1b5f6fc5347f44ca52df0a58

    • SHA256

      83394afef201b339640f94c5d7a054be01a94852edda1efb154de52cd49203e8

    • SHA512

      2b997dea2fffc33720bb400d46d3c41549be4481c6dc0e7016a657bab01cf1b4cf35419ea421231c787ea8e3379b97725ac0766575b51b13f723cf21ec302de8

    • SSDEEP

      98304:CibxzWoWCzGKFeRWCcqnfN7WSxP1l/RcblYTT4ROHiq1mOc9d8:Cibx/WWFCjJWblw4ROCq10

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks