General
-
Target
609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b
-
Size
3.5MB
-
Sample
240603-jc4rcagb3x
-
MD5
395161331ce991c86036338cd9bce3ed
-
SHA1
4a6be0d34004a764cd95d4a201c6d9067b366c66
-
SHA256
609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b
-
SHA512
7c6cbaca73d4abeb5f700814c4c87a45e81eb63e759b0f8e95a5c8dbc3b5a1233618f0db7c074a07c5060f1a1f7954d529229c8371567b6c2a201c223e87e0bf
-
SSDEEP
49152:bEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWT:bEjlmQbfgSgwvSnN4iVJuh0xzr+IIq6
Behavioral task
behavioral1
Sample
609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
gozi
Targets
-
-
Target
609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b
-
Size
3.5MB
-
MD5
395161331ce991c86036338cd9bce3ed
-
SHA1
4a6be0d34004a764cd95d4a201c6d9067b366c66
-
SHA256
609c19fd3ef2e33446f268f538a12e5f88d6b0169aaaf7075405036874e3149b
-
SHA512
7c6cbaca73d4abeb5f700814c4c87a45e81eb63e759b0f8e95a5c8dbc3b5a1233618f0db7c074a07c5060f1a1f7954d529229c8371567b6c2a201c223e87e0bf
-
SSDEEP
49152:bEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWT:bEjlmQbfgSgwvSnN4iVJuh0xzr+IIq6
Score7/10-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-