General

  • Target

    3d9fbafb59a2713fc563d9abbeb989d3a870817d2571cec436dfdf1ec4e7595f

  • Size

    3.5MB

  • Sample

    240603-d37yssbb26

  • MD5

    27fb9b1125fbb93ee23efc459b80420d

  • SHA1

    992e7ac9da871c26de56262c9e7b47fb7fd0c437

  • SHA256

    3d9fbafb59a2713fc563d9abbeb989d3a870817d2571cec436dfdf1ec4e7595f

  • SHA512

    c76a854298644d57c44c8fdacd7035c44a4c851caeef50131aaa5ab29b2ff56704e9560fa99dc628e397269f818d18c675f90d5305c38b9fe09d20bdcf8b1794

  • SSDEEP

    49152:yEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWI:yEjlmQbfgSgwvSnN4iVJub0xtrNIJqj

Malware Config

Extracted

Family

gozi

Targets

    • Target

      3d9fbafb59a2713fc563d9abbeb989d3a870817d2571cec436dfdf1ec4e7595f

    • Size

      3.5MB

    • MD5

      27fb9b1125fbb93ee23efc459b80420d

    • SHA1

      992e7ac9da871c26de56262c9e7b47fb7fd0c437

    • SHA256

      3d9fbafb59a2713fc563d9abbeb989d3a870817d2571cec436dfdf1ec4e7595f

    • SHA512

      c76a854298644d57c44c8fdacd7035c44a4c851caeef50131aaa5ab29b2ff56704e9560fa99dc628e397269f818d18c675f90d5305c38b9fe09d20bdcf8b1794

    • SSDEEP

      49152:yEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWI:yEjlmQbfgSgwvSnN4iVJub0xtrNIJqj

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks