General
-
Target
61bf80cb8beb60482b5a27ca37f8777f7bb8ca0e6c0bf2cf90a0f1e627acb1f9N
-
Size
4.2MB
-
Sample
241107-aapd7stjan
-
MD5
bc5d833c71dc09b5caf6eaeedd309d50
-
SHA1
3cd5a33c31905b3a5be185c346bfb839150e8e54
-
SHA256
61bf80cb8beb60482b5a27ca37f8777f7bb8ca0e6c0bf2cf90a0f1e627acb1f9
-
SHA512
50d0a424c81a8093f713da30f919a2f047b96ecbde588b4b1f49ce010c9bb978560f76e20c7a4332c3353d9180ddb76d2353b2c24c92e51aefeaf169405a9ebb
-
SSDEEP
98304:Dg2KK3z9OP+9Rqc7nILa0az2jjSNLdDSznsO5fUTVf1+R3LzyZB:E2KKjQ+9RZ7nD23Sj4z5fURf8ZLzyZB
Behavioral task
behavioral1
Sample
61bf80cb8beb60482b5a27ca37f8777f7bb8ca0e6c0bf2cf90a0f1e627acb1f9N.exe
Resource
win7-20240708-en
Malware Config
Extracted
gozi
Targets
-
-
Target
61bf80cb8beb60482b5a27ca37f8777f7bb8ca0e6c0bf2cf90a0f1e627acb1f9N
-
Size
4.2MB
-
MD5
bc5d833c71dc09b5caf6eaeedd309d50
-
SHA1
3cd5a33c31905b3a5be185c346bfb839150e8e54
-
SHA256
61bf80cb8beb60482b5a27ca37f8777f7bb8ca0e6c0bf2cf90a0f1e627acb1f9
-
SHA512
50d0a424c81a8093f713da30f919a2f047b96ecbde588b4b1f49ce010c9bb978560f76e20c7a4332c3353d9180ddb76d2353b2c24c92e51aefeaf169405a9ebb
-
SSDEEP
98304:Dg2KK3z9OP+9Rqc7nILa0az2jjSNLdDSznsO5fUTVf1+R3LzyZB:E2KKjQ+9RZ7nD23Sj4z5fURf8ZLzyZB
-
Blackmoon family
-
Detect Blackmoon payload
-
Gozi family
-
Xmrig family
-
XMRig Miner payload
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1