General
-
Target
92d37f9699672b48a816d0da0db68167ea7f45dfd7137bb48cf6e9e36d7076b4
-
Size
199KB
-
Sample
241108-b22paavlhq
-
MD5
b6472d999d771b922bf1c1b9e5da1c07
-
SHA1
b346bea7343dc739dad96e78d0a6a9fbff64d3f9
-
SHA256
92d37f9699672b48a816d0da0db68167ea7f45dfd7137bb48cf6e9e36d7076b4
-
SHA512
fd0c5a1ead59f238fa4288dcfb08570c366ff7a5cfc4e78eca05284b7f75cb9f2fb7825064d5e2d48a9340d6c092a4605e803cb87f6f4882a510fe43dccc0cfd
-
SSDEEP
6144:g1BpcJrVKdeOPLTlKYoT4byFgUcVydDeT:UBHMOPXljoTHPn6T
Static task
static1
Behavioral task
behavioral1
Sample
92d37f9699672b48a816d0da0db68167ea7f45dfd7137bb48cf6e9e36d7076b4.exe
Resource
win7-20240903-en
Malware Config
Extracted
gozi
Targets
-
-
Target
92d37f9699672b48a816d0da0db68167ea7f45dfd7137bb48cf6e9e36d7076b4
-
Size
199KB
-
MD5
b6472d999d771b922bf1c1b9e5da1c07
-
SHA1
b346bea7343dc739dad96e78d0a6a9fbff64d3f9
-
SHA256
92d37f9699672b48a816d0da0db68167ea7f45dfd7137bb48cf6e9e36d7076b4
-
SHA512
fd0c5a1ead59f238fa4288dcfb08570c366ff7a5cfc4e78eca05284b7f75cb9f2fb7825064d5e2d48a9340d6c092a4605e803cb87f6f4882a510fe43dccc0cfd
-
SSDEEP
6144:g1BpcJrVKdeOPLTlKYoT4byFgUcVydDeT:UBHMOPXljoTHPn6T
-
Gozi family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3