General

  • Target

    tster.exe

  • Size

    11KB

  • Sample

    240602-3f34rsba6x

  • MD5

    feb6fd23d005b8d70446866b206042f8

  • SHA1

    d7d01f6639e0f060e91a35949f9bf346aa0ea81a

  • SHA256

    81f3c9ef76877647a56874054c58756d67e512ad55a0ab273dfa5e88dddd7c5c

  • SHA512

    20f86fa77e079bd3794c32e793a9adb79ad7d847ca8d74591321153330dfa9aa15d11279b45a9497fec910b58533cdeedc293858fa29d20ffb80f96d519c70da

  • SSDEEP

    192:52R8JP/PCS+plrpcV5K9+JPiukknPfhTx0ujmN+LKyOLi:58Q/a9plrpcVI9SKQfgutKyOL

Malware Config

Extracted

Family

gozi

Targets

    • Target

      tster.exe

    • Size

      11KB

    • MD5

      feb6fd23d005b8d70446866b206042f8

    • SHA1

      d7d01f6639e0f060e91a35949f9bf346aa0ea81a

    • SHA256

      81f3c9ef76877647a56874054c58756d67e512ad55a0ab273dfa5e88dddd7c5c

    • SHA512

      20f86fa77e079bd3794c32e793a9adb79ad7d847ca8d74591321153330dfa9aa15d11279b45a9497fec910b58533cdeedc293858fa29d20ffb80f96d519c70da

    • SSDEEP

      192:52R8JP/PCS+plrpcV5K9+JPiukknPfhTx0ujmN+LKyOLi:58Q/a9plrpcVI9SKQfgutKyOL

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks