General

  • Target

    9dd4b0967ce5fe188060c8faa18421846a49441259f561651a48e77f010c3c75

  • Size

    3.5MB

  • Sample

    231123-251t9seb3y

  • MD5

    0bf6622663885d097ee45aa0b80c2abd

  • SHA1

    cd344916c1bd61be896bae671122f062f77f1da7

  • SHA256

    9dd4b0967ce5fe188060c8faa18421846a49441259f561651a48e77f010c3c75

  • SHA512

    da398cf0c3d39cfd8414230c9774499e899eb9b828980c8eac9c688a654af628302a77de99ad446df7f253b631c8e51e4d6d4e630b8cb48b64d68e66d8a0ab04

  • SSDEEP

    49152:uEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWM:uEjlmQbfgSgwvSnN4iVJu10xLrTg3q3

Malware Config

Extracted

Family

gozi

Targets

    • Target

      9dd4b0967ce5fe188060c8faa18421846a49441259f561651a48e77f010c3c75

    • Size

      3.5MB

    • MD5

      0bf6622663885d097ee45aa0b80c2abd

    • SHA1

      cd344916c1bd61be896bae671122f062f77f1da7

    • SHA256

      9dd4b0967ce5fe188060c8faa18421846a49441259f561651a48e77f010c3c75

    • SHA512

      da398cf0c3d39cfd8414230c9774499e899eb9b828980c8eac9c688a654af628302a77de99ad446df7f253b631c8e51e4d6d4e630b8cb48b64d68e66d8a0ab04

    • SSDEEP

      49152:uEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWM:uEjlmQbfgSgwvSnN4iVJu10xLrTg3q3

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks