General

  • Target

    d75a6643e7d5f92f3a79c1d4122640c8d383c48ba39753b11d1d9e26cc678968

  • Size

    3.5MB

  • Sample

    240112-1c6dlsfagp

  • MD5

    b7ef90f8da568363a178da6abf8ce44c

  • SHA1

    ef0b945fb55b05ed482c7bbe9fa8d7a689ec6b11

  • SHA256

    d75a6643e7d5f92f3a79c1d4122640c8d383c48ba39753b11d1d9e26cc678968

  • SHA512

    900f5d104f445bcfd77d7cc4f9e58a3a7ed76861555da1b7f37521f0af47278682eb75324499a7c72b0ed2c20f761c24cbd021aec40033a72cf03a786cb83ab3

  • SSDEEP

    49152:bEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWK:bEjlmQbfgSgwvSnN4iVJuS0xHrmQmq6

Malware Config

Extracted

Family

gozi

Targets

    • Target

      d75a6643e7d5f92f3a79c1d4122640c8d383c48ba39753b11d1d9e26cc678968

    • Size

      3.5MB

    • MD5

      b7ef90f8da568363a178da6abf8ce44c

    • SHA1

      ef0b945fb55b05ed482c7bbe9fa8d7a689ec6b11

    • SHA256

      d75a6643e7d5f92f3a79c1d4122640c8d383c48ba39753b11d1d9e26cc678968

    • SHA512

      900f5d104f445bcfd77d7cc4f9e58a3a7ed76861555da1b7f37521f0af47278682eb75324499a7c72b0ed2c20f761c24cbd021aec40033a72cf03a786cb83ab3

    • SSDEEP

      49152:bEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWK:bEjlmQbfgSgwvSnN4iVJuS0xHrmQmq6

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks