General

  • Target

    609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b

  • Size

    3.5MB

  • Sample

    240603-jc4rcagb3x

  • MD5

    395161331ce991c86036338cd9bce3ed

  • SHA1

    4a6be0d34004a764cd95d4a201c6d9067b366c66

  • SHA256

    609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b

  • SHA512

    7c6cbaca73d4abeb5f700814c4c87a45e81eb63e759b0f8e95a5c8dbc3b5a1233618f0db7c074a07c5060f1a1f7954d529229c8371567b6c2a201c223e87e0bf

  • SSDEEP

    49152:bEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWT:bEjlmQbfgSgwvSnN4iVJuh0xzr+IIq6

Malware Config

Extracted

Family

gozi

Targets

    • Target

      609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b

    • Size

      3.5MB

    • MD5

      395161331ce991c86036338cd9bce3ed

    • SHA1

      4a6be0d34004a764cd95d4a201c6d9067b366c66

    • SHA256

      609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b

    • SHA512

      7c6cbaca73d4abeb5f700814c4c87a45e81eb63e759b0f8e95a5c8dbc3b5a1233618f0db7c074a07c5060f1a1f7954d529229c8371567b6c2a201c223e87e0bf

    • SSDEEP

      49152:bEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWT:bEjlmQbfgSgwvSnN4iVJuh0xzr+IIq6

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks