General

  • Target

    5f51de359fd1018e1ae0e930df392c91a83b97d926cbbb4877bf320b77f8739eN

  • Size

    3.5MB

  • Sample

    241031-e74yda1qfq

  • MD5

    18673c628de9202d688faa4d596ca070

  • SHA1

    24e6ac1714e394b8986f2d100b755793aa8d196f

  • SHA256

    5f51de359fd1018e1ae0e930df392c91a83b97d926cbbb4877bf320b77f8739e

  • SHA512

    952e6847caa3768a5794e3b92728a218fff94efcbabdf40b3f65cbd63a0478610f32e2eee01eb803abcd0e93473204d18e1e9e79d5229c999b8c9efde5937673

  • SSDEEP

    49152:DEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gW/:DEjlmQbfgSgwvSnN4iVJue0xQ0QHqH

Malware Config

Extracted

Family

gozi

Targets

    • Target

      5f51de359fd1018e1ae0e930df392c91a83b97d926cbbb4877bf320b77f8739eN

    • Size

      3.5MB

    • MD5

      18673c628de9202d688faa4d596ca070

    • SHA1

      24e6ac1714e394b8986f2d100b755793aa8d196f

    • SHA256

      5f51de359fd1018e1ae0e930df392c91a83b97d926cbbb4877bf320b77f8739e

    • SHA512

      952e6847caa3768a5794e3b92728a218fff94efcbabdf40b3f65cbd63a0478610f32e2eee01eb803abcd0e93473204d18e1e9e79d5229c999b8c9efde5937673

    • SSDEEP

      49152:DEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gW/:DEjlmQbfgSgwvSnN4iVJue0xQ0QHqH

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks