Overview
overview
10Static
static
513f8bb1af7...be.exe
windows7-x64
1013f8bb1af7...be.exe
windows10-2004-x64
1049b84085b7...c6.exe
windows7-x64
1049b84085b7...c6.exe
windows10-2004-x64
10639a86559b...3d.exe
windows7-x64
10639a86559b...3d.exe
windows10-2004-x64
10c0cf40b883...3a.exe
windows7-x64
8c0cf40b883...3a.exe
windows10-2004-x64
8e49778d20a...73.exe
windows7-x64
8e49778d20a...73.exe
windows10-2004-x64
8inquiry.scr
windows7-x64
9inquiry.scr
windows10-2004-x64
9Накла...15.scr
windows7-x64
3Накла...15.scr
windows10-2004-x64
3ПРЕТЕ...Я.scr
windows7-x64
5ПРЕТЕ...Я.scr
windows10-2004-x64
5Счет �...08.scr
windows7-x64
3Счет �...08.scr
windows10-2004-x64
3карто...я.scr
windows7-x64
5карто...я.scr
windows10-2004-x64
5General
-
Target
Newfolder.zip
-
Size
3.4MB
-
Sample
241104-achdnsyekm
-
MD5
b7bcd3637b31b6d8ff37f560c5409964
-
SHA1
fe32ae6f0d9f2121bf686ab3d1908f0b1ae0215f
-
SHA256
964b46902e35f2265ff48533ef541f3783c91b2ae8716a3085b8954c68017954
-
SHA512
6d8f67857b518a244498efe5ef9af4fac9056a200d9ebd06a6cbf283d2d22b4610ec8304bf09aecff08d63977d721349a96767f32f657779bed109e7159dd147
-
SSDEEP
98304:IvFm+176I8vIAOISWSfLvsN/3ySfLvsNQ:IB1WLvIABSf83ySfr
Behavioral task
behavioral1
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
inquiry.scr
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
inquiry.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Накладная для 1736 от 26.08.2015.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ПРЕТЕНЗИЯ.scr
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ПРЕТЕНЗИЯ.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Счет на оплату от 26-08.scr
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Счет на оплату от 26-08.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
карточка предприятия.scr
Resource
win7-20240903-en
Malware Config
Extracted
gozi
-
build
215798
Extracted
gozi
1020
line.laslottery.com/htue503dt
line.fastfuel18.com/htue503dt
line.stkingsfunhouse.com/htue503dt
line.lovelacedweddings.com/htue503dt
lansystemstat.com/htue503dt
highnetwork.pw/htue503dt
-
exe_type
worker
-
server_id
60
Targets
-
-
Target
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be.exe
-
Size
348KB
-
MD5
ff948412f6437a133022c32e7e94e11b
-
SHA1
bb60858ac2fa2910e21151262d1990bf50b6d42f
-
SHA256
13f8bb1af7e80604416111a9e5508426df058e53eb2f096d110fd74f55f798be
-
SHA512
3595c83f4106cda9a086d6b84f1110e9e97f5cb9d156d0088ec6229b22098b30650108dd6b4ca2ec1d46b108a1db334f741f7ab0e694960be3f5f72aff9194b4
-
SSDEEP
6144:q7P2fhhwRRWJhL+H/TZ5A9TYcwElgB2EYwxYeEZIGJABN6e:q7gSRWJhSH7tNB2E7xYeEuhD
-
Gozi family
-
Suspicious use of SetThreadContext
-
-
-
Target
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6.exe
-
Size
507KB
-
MD5
6e352a6e96db293f487d1c1996f7ca60
-
SHA1
887a357a96b9dbb428b6b776a3ec8ca8de746f18
-
SHA256
49b84085b7cc731d39fda5a6c15d8bedf3051f3e3f8792f4a50220ebdbf1a4c6
-
SHA512
bad3b109707b7ba714ccfd41109d6defe9aa2c651cd7dd8c91f536622fa52394071e858a81a2844421a56219527737d395580ea73e250f6cb44c4c1c4959351d
-
SSDEEP
12288:IEi3NId2zO8PW418jZZUozZuzYgwz3r14Y07KCJ:GrdZ+tZlVUYBzB0KC
-
Gozi family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
-
-
Target
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d.exe
-
Size
511KB
-
MD5
afb4846bd287f31e6297cb4095aece65
-
SHA1
b92d682a800d82ff6e980deae88f6cb7e048c11d
-
SHA256
639a86559b0a086fe388e4309ea22e49f79362c0983df1a5b09fa477db3c463d
-
SHA512
8f5b3062a7f4faada34001bbe8510235d20b3d507ee0858ef23db92853f31a3075c60e37738a93e1385995199c9d99dccb7e547247fc9af5b8a8f3557d03d070
-
SSDEEP
12288:nTY7/WAuLAOOxsgfj40bDKg0m7t4is8jYar:kusO+RDKgJBnsgYa
-
Gozi family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a.exe
-
Size
370KB
-
MD5
a890e2f924dea3cb3e46a95431ffae39
-
SHA1
35719ee58a5771156bc956bcf1b5c54ac3391593
-
SHA256
c0cf40b8830d666a24bdd4febdc162e95aa30ed968fa3675e26ad97b2e88e03a
-
SHA512
664fb8075712912be30185d17d912dae148e778627e852affe1b1080bb9c8d5917e7b3c1d194e62ac6919c16235754f776523ba7ce95af38be86b61cc3e3d162
-
SSDEEP
6144:KRzMgpY8bXFHW1FbwwEHidUoagoW2C9cuqBGI4Zq6mYN8+G5l9PAzJdVeO2Ui:sDRbXFHW1+K2UWBGIymYG+i9A+ONi
Score8/10-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573.exe
-
Size
329KB
-
MD5
adb5c262ca4f95fee36ae4b9b5d41d45
-
SHA1
cdbe420609fec04ddf3d74297fc2320b6a8a898e
-
SHA256
e49778d20a2f9b1f8b00ddd24b6bcee81af381ed02cfe0a3c9ab3111cda5f573
-
SHA512
dad3541217a7f1fde669441a3f987794ee58ae44e7899d7ed5ebdf59e8174e2924441ea8474701908071df74479a4f928b673c2d9086c67078a2a861b61ba754
-
SSDEEP
6144:TRzMgpY8bXFHW1FbwwEHidUoagoW2C9cuqBGI4Zq6mYN8+N6MSiF0Q5XNN:pDRbXFHW1+K2UWBGIymYG+zn
Score8/10-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
inquiry.scr
-
Size
326KB
-
MD5
f4d9b484375b2cb5413c6425dc75e681
-
SHA1
4e90a435759d6f2dffebba6e26f196ef88891e20
-
SHA256
8cc1b94b6d5df9bc92e500a8c52877f3fdaeeba7862756a82c36fa363ae22ade
-
SHA512
b47b88b38c8f505dfda8f80ba8f5175ab607a032a6a84e47158f80cd7769cffd5a2a579b12317167abdb9d1a0bf4c922d98e8b18566f61ad417a0c76cf0d3d50
-
SSDEEP
6144:tcExBVCbiKM3zvdbvgmDAz2z9HViJocXZY9ltuSuEz4qQcZc:aEfVw8DvdLgYA4gXOuFEU3
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Накладная для 1736 от 26.08.2015.scr
-
Size
666KB
-
MD5
431dec6895f8bc58b30999dbf42b16b3
-
SHA1
31627f1bd918b8dc768ca49efc940700c9e478f3
-
SHA256
78712a327850ff677ab0a4a299ded9b05f3bd7680a3d5997729555de64d57b45
-
SHA512
922111bee58a2b93b9ca84b049050659321c1ff0e2751155fa71ebf38576336289e25b9431c38cfaa67af311ebd5e685d4f300ce3eb138cf6f50f818479e6e00
-
SSDEEP
12288:1XmwRo+mv8QD4+0N46OGHhikTJ87dd4fP+UVp5158fQ6asdgqislMo8GaJ:1X48QE+UQOXu4XrVp/X/sjllMw+
Score3/10 -
-
-
Target
ПРЕТЕНЗИЯ.scr
-
Size
231KB
-
MD5
6c01e0f297debe4606cf2cab510c38ab
-
SHA1
cea2a8e2f75a027fbbcada3aae952247009cdfbc
-
SHA256
d228eaf1e691f993be276129421583737f85185eb8f04695db7707dc3ac175fb
-
SHA512
c56ec26ccde738aef65d35e8adbb5f871194716f23b90532d9ec397f2ea2788b8b186eb2787e166eb2e898a579081525a0ea806dbb1cb0b3ee7e49af7ad97b50
-
SSDEEP
6144:THJih6+NSgZ7OT1Oq1qbS1x9pAxEP3vgBHK:TpWRZ7OJODuq6/
-
-
-
Target
Счет на оплату от 26-08.scr
-
Size
666KB
-
MD5
431dec6895f8bc58b30999dbf42b16b3
-
SHA1
31627f1bd918b8dc768ca49efc940700c9e478f3
-
SHA256
78712a327850ff677ab0a4a299ded9b05f3bd7680a3d5997729555de64d57b45
-
SHA512
922111bee58a2b93b9ca84b049050659321c1ff0e2751155fa71ebf38576336289e25b9431c38cfaa67af311ebd5e685d4f300ce3eb138cf6f50f818479e6e00
-
SSDEEP
12288:1XmwRo+mv8QD4+0N46OGHhikTJ87dd4fP+UVp5158fQ6asdgqislMo8GaJ:1X48QE+UQOXu4XrVp/X/sjllMw+
Score3/10 -
-
-
Target
карточка предприятия.scr
-
Size
185KB
-
MD5
f1b11de8044720671240999846fe5e69
-
SHA1
03ae6c1090cd6392365fe9d4cfc061bb626688ad
-
SHA256
37f6ccf41a6f66008651c0d272090da64b3b28f6970a9404cb5ecf886ea776b1
-
SHA512
8c4bd6b406a1e2edf3f6bb9bb6b3debae4b6b312e474b4a9bedb93b097a45d193a4a3d6a0119e2ade467ced262ef9941e4c578720d227b9be58a8cdb44074894
-
SSDEEP
3072:R/JLIuc9pgKqUsZ+tKbewtr2ab+/MThp5rTTiLIQ1mKCRhgvpIXljSQ1ZdBc:R/JFutWDWabJ1PrTeLD1FyhgvpIXlV1P
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1