General

  • Target

    8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482

  • Size

    3.5MB

  • Sample

    240223-yrh6hsha8v

  • MD5

    24f3529de0a6cdcd26a261b36af5d757

  • SHA1

    250a806d98cdbd95482c3a8277e77679e7a4ce9f

  • SHA256

    8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482

  • SHA512

    786ae8df1a70d352732cb79dc428dbcf8bd01c33100cb9b268e24ce7c7a0595ba31d025751fbfb4a2b6ebf6e7a1ba96534d1f026efed40c93c7178c6d8ea6402

  • SSDEEP

    49152:1EjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWY:1EjlmQbfgSgwvSnN4iVJuT0xOrXMEqN

Malware Config

Extracted

Family

gozi

Targets

    • Target

      8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482

    • Size

      3.5MB

    • MD5

      24f3529de0a6cdcd26a261b36af5d757

    • SHA1

      250a806d98cdbd95482c3a8277e77679e7a4ce9f

    • SHA256

      8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482

    • SHA512

      786ae8df1a70d352732cb79dc428dbcf8bd01c33100cb9b268e24ce7c7a0595ba31d025751fbfb4a2b6ebf6e7a1ba96534d1f026efed40c93c7178c6d8ea6402

    • SSDEEP

      49152:1EjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWY:1EjlmQbfgSgwvSnN4iVJuT0xOrXMEqN

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks