General

  • Target

    80fdf93966123b8f52dc782635ed6cac

  • Size

    484KB

  • Sample

    231226-v6ceqsbgg3

  • MD5

    80fdf93966123b8f52dc782635ed6cac

  • SHA1

    229d70fa81053040d2a6bbfcde62c4234c41d388

  • SHA256

    59b7f1108a1a99ea8897952a5701e3cc771d7aa4adb0e6032a70c652eb2c0bd2

  • SHA512

    a3a0257e846d581e9f5475a07329ef775c833f0be0ef9f87b20ba601a9dc08b625908f6ec2bc7871fcda8476f51df607d11227e4167db2acc154233c7cc8aec8

  • SSDEEP

    12288:+Pa04+mliw+mpwfN4wZtshcgSN3SJpzQvpuvde5:YQ4wlKtwUSJ2vH

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

8877

C2

outlook.com

zaluoa.live

daskdjknefjkewfnkjwe.net

Attributes
  • base_path

    /jkloop/

  • build

    250207

  • dga_season

    10

  • exe_type

    loader

  • extension

    .kre

  • server_id

    12

rsa_pubkey.plain
serpent.plain

Targets

    • Target

      80fdf93966123b8f52dc782635ed6cac

    • Size

      484KB

    • MD5

      80fdf93966123b8f52dc782635ed6cac

    • SHA1

      229d70fa81053040d2a6bbfcde62c4234c41d388

    • SHA256

      59b7f1108a1a99ea8897952a5701e3cc771d7aa4adb0e6032a70c652eb2c0bd2

    • SHA512

      a3a0257e846d581e9f5475a07329ef775c833f0be0ef9f87b20ba601a9dc08b625908f6ec2bc7871fcda8476f51df607d11227e4167db2acc154233c7cc8aec8

    • SSDEEP

      12288:+Pa04+mliw+mpwfN4wZtshcgSN3SJpzQvpuvde5:YQ4wlKtwUSJ2vH

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks