General

  • Target

    f3f1c8488767808005c4c28fb4dac9693d4f374a823188aa8746c02a6728f4deN

  • Size

    163KB

  • Sample

    241008-z76r7axgjr

  • MD5

    e53609afef7323063dda20c8c06c0dd0

  • SHA1

    df7fabb28c3dc097e29691b1f0644fdf081ebfe9

  • SHA256

    f3f1c8488767808005c4c28fb4dac9693d4f374a823188aa8746c02a6728f4de

  • SHA512

    3f2905359ec97f13db0afa791dc5bb54ec5a8ec53069db55f334e93943ab4b508e620fb08500d020fb8536aa4aa2e7c264f9040b821c6134a1f85ccef0812d7d

  • SSDEEP

    1536:P6+G4cBc+9LulSuSRhwDZ5PQVWtFWa4fiqClProNVU4qNVUrk/9QbfBr+7GwKrPb:BG4ceeHUBQ0JZqCltOrWKDBr+yJb

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://master-x.com/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://crutop.ru/index.php

http://kaspersky.ru/index.php

http://color-bank.ru/index.php

http://adult-empire.com/index.php

http://virus-list.com/index.php

http://trojan.ru/index.php

http://xware.cjb.net/index.htm

http://konfiskat.org/index.htm

http://parex-bank.ru/index.htm

http://fethard.biz/index.htm

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

Extracted

Family

gozi

Targets

    • Target

      f3f1c8488767808005c4c28fb4dac9693d4f374a823188aa8746c02a6728f4deN

    • Size

      163KB

    • MD5

      e53609afef7323063dda20c8c06c0dd0

    • SHA1

      df7fabb28c3dc097e29691b1f0644fdf081ebfe9

    • SHA256

      f3f1c8488767808005c4c28fb4dac9693d4f374a823188aa8746c02a6728f4de

    • SHA512

      3f2905359ec97f13db0afa791dc5bb54ec5a8ec53069db55f334e93943ab4b508e620fb08500d020fb8536aa4aa2e7c264f9040b821c6134a1f85ccef0812d7d

    • SSDEEP

      1536:P6+G4cBc+9LulSuSRhwDZ5PQVWtFWa4fiqClProNVU4qNVUrk/9QbfBr+7GwKrPb:BG4ceeHUBQ0JZqCltOrWKDBr+yJb

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks