General

  • Target

    8c6cc10e6b1b2d6454b59c535c115e71d415d2d4247ca239c0734eddb556aa8b

  • Size

    3.6MB

  • Sample

    240223-yfec7agf7w

  • MD5

    3f25b6a0a92e74f0e69b6724cb901990

  • SHA1

    2f67966f2ac17f84cad68755f1432a4662c20bb4

  • SHA256

    8c6cc10e6b1b2d6454b59c535c115e71d415d2d4247ca239c0734eddb556aa8b

  • SHA512

    4b90e60be1dd2349d330eec2eac0b26ba3158b93fa8ca29f5b1f0ce4c1f269d8c64b649df6482e28482335b33bd3f46753c6ccb693af024ea7589feac92fe94f

  • SSDEEP

    49152:kEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWd:kEjlmQbfgSgwvSnN4iVJuV0xNx+/UPqN

Malware Config

Extracted

Family

gozi

Targets

    • Target

      8c6cc10e6b1b2d6454b59c535c115e71d415d2d4247ca239c0734eddb556aa8b

    • Size

      3.6MB

    • MD5

      3f25b6a0a92e74f0e69b6724cb901990

    • SHA1

      2f67966f2ac17f84cad68755f1432a4662c20bb4

    • SHA256

      8c6cc10e6b1b2d6454b59c535c115e71d415d2d4247ca239c0734eddb556aa8b

    • SHA512

      4b90e60be1dd2349d330eec2eac0b26ba3158b93fa8ca29f5b1f0ce4c1f269d8c64b649df6482e28482335b33bd3f46753c6ccb693af024ea7589feac92fe94f

    • SSDEEP

      49152:kEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWd:kEjlmQbfgSgwvSnN4iVJuV0xNx+/UPqN

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks