General

  • Target

    28d86d9aa5ce8c810222c62ab65c1ee744b6694e7e9f466d4fb4f54978a4a9f8

  • Size

    3.4MB

  • Sample

    240524-ffhfqsdh9z

  • MD5

    0a15e27e8ff4f65aa40962e34f07171e

  • SHA1

    60ef38a55594521126745dc81116f0ab661f90cf

  • SHA256

    28d86d9aa5ce8c810222c62ab65c1ee744b6694e7e9f466d4fb4f54978a4a9f8

  • SHA512

    a114410c6212884d5dc165bb805b5761a6075e49072f190db97d678fa9ea41299b05223c6095bab39c58058e6a0d2a6544a0554cd1b20da83e75f0f668c0a8f4

  • SSDEEP

    49152:hEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWx:hEjlmQbfgSgwvSnN4iVJuS0xJdzYUqA

Malware Config

Extracted

Family

gozi

Targets

    • Target

      28d86d9aa5ce8c810222c62ab65c1ee744b6694e7e9f466d4fb4f54978a4a9f8

    • Size

      3.4MB

    • MD5

      0a15e27e8ff4f65aa40962e34f07171e

    • SHA1

      60ef38a55594521126745dc81116f0ab661f90cf

    • SHA256

      28d86d9aa5ce8c810222c62ab65c1ee744b6694e7e9f466d4fb4f54978a4a9f8

    • SHA512

      a114410c6212884d5dc165bb805b5761a6075e49072f190db97d678fa9ea41299b05223c6095bab39c58058e6a0d2a6544a0554cd1b20da83e75f0f668c0a8f4

    • SSDEEP

      49152:hEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWx:hEjlmQbfgSgwvSnN4iVJuS0xJdzYUqA

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks