General
-
Target
8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482
-
Size
3.5MB
-
Sample
240223-yrh6hsha8v
-
MD5
24f3529de0a6cdcd26a261b36af5d757
-
SHA1
250a806d98cdbd95482c3a8277e77679e7a4ce9f
-
SHA256
8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482
-
SHA512
786ae8df1a70d352732cb79dc428dbcf8bd01c33100cb9b268e24ce7c7a0595ba31d025751fbfb4a2b6ebf6e7a1ba96534d1f026efed40c93c7178c6d8ea6402
-
SSDEEP
49152:1EjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWY:1EjlmQbfgSgwvSnN4iVJuT0xOrXMEqN
Behavioral task
behavioral1
Sample
8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
gozi
Targets
-
-
Target
8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482
-
Size
3.5MB
-
MD5
24f3529de0a6cdcd26a261b36af5d757
-
SHA1
250a806d98cdbd95482c3a8277e77679e7a4ce9f
-
SHA256
8e7bdc2280f6158a2bf175a87be4c5c6625e1318f1c55e4dc0d9ad3de922c482
-
SHA512
786ae8df1a70d352732cb79dc428dbcf8bd01c33100cb9b268e24ce7c7a0595ba31d025751fbfb4a2b6ebf6e7a1ba96534d1f026efed40c93c7178c6d8ea6402
-
SSDEEP
49152:1EjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWY:1EjlmQbfgSgwvSnN4iVJuT0xOrXMEqN
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-