General

  • Target

    556cc89738e8c26fea34b6964e74da80ef1eca772d75f258b435fa8a4ce30f74

  • Size

    3.4MB

  • Sample

    240511-ajzljaaa8t

  • MD5

    3a6e5a328cf6c095f20eac0bf59dae6a

  • SHA1

    38f5c644c43e347e186b5461fa973117c3b6b4cc

  • SHA256

    556cc89738e8c26fea34b6964e74da80ef1eca772d75f258b435fa8a4ce30f74

  • SHA512

    b382f412e72e2b8b573fabfd5b2d7d3d1f8940b8528d94e252e45bfdb2f9aca5236cbffe9a95a5f927792180101482a1a702a5b734e81e582e858f43399e7f0d

  • SSDEEP

    49152:KEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gW7:KEjlmQbfgSgwvSnN4iVJuS0xJdzYUq+

Malware Config

Extracted

Family

gozi

Targets

    • Target

      556cc89738e8c26fea34b6964e74da80ef1eca772d75f258b435fa8a4ce30f74

    • Size

      3.4MB

    • MD5

      3a6e5a328cf6c095f20eac0bf59dae6a

    • SHA1

      38f5c644c43e347e186b5461fa973117c3b6b4cc

    • SHA256

      556cc89738e8c26fea34b6964e74da80ef1eca772d75f258b435fa8a4ce30f74

    • SHA512

      b382f412e72e2b8b573fabfd5b2d7d3d1f8940b8528d94e252e45bfdb2f9aca5236cbffe9a95a5f927792180101482a1a702a5b734e81e582e858f43399e7f0d

    • SSDEEP

      49152:KEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gW7:KEjlmQbfgSgwvSnN4iVJuS0xJdzYUq+

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks