General

  • Target

    bc2df11b6b093215759870f3e66066bef3612e8afdc05f3418a0a68c948c2603

  • Size

    3.8MB

  • Sample

    240224-ay6y6adh51

  • MD5

    126c03f6eec9630d9caf18fff179cea0

  • SHA1

    8a0e6533246b3b9394dc20932d037114b7db1a07

  • SHA256

    bc2df11b6b093215759870f3e66066bef3612e8afdc05f3418a0a68c948c2603

  • SHA512

    5c0d7dc011444aca3f96118ab8f97c1985baf696c25287c9236c158c017c8ee4a636600960d8ad92ac6c1e139f000455e1c29750f59bad5276556d140cebd812

  • SSDEEP

    98304:iEjlmQbfgSgwvSnN4iVJu+0xGZ6twFquI3rFq9:iEjgQPXqdEtwYf3rFq9

Malware Config

Extracted

Family

gozi

Targets

    • Target

      bc2df11b6b093215759870f3e66066bef3612e8afdc05f3418a0a68c948c2603

    • Size

      3.8MB

    • MD5

      126c03f6eec9630d9caf18fff179cea0

    • SHA1

      8a0e6533246b3b9394dc20932d037114b7db1a07

    • SHA256

      bc2df11b6b093215759870f3e66066bef3612e8afdc05f3418a0a68c948c2603

    • SHA512

      5c0d7dc011444aca3f96118ab8f97c1985baf696c25287c9236c158c017c8ee4a636600960d8ad92ac6c1e139f000455e1c29750f59bad5276556d140cebd812

    • SSDEEP

      98304:iEjlmQbfgSgwvSnN4iVJu+0xGZ6twFquI3rFq9:iEjgQPXqdEtwYf3rFq9

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks