General

  • Target

    80db67cec959db1709d51f79337cd2a84ba678fb39f5b108dc9f5752f920126cN.exe

  • Size

    245KB

  • Sample

    241112-f5qhmsyqcq

  • MD5

    323450b3f7f17610765a75aa7edda9de

  • SHA1

    a685864f30584b1d88a8a369393959b1c9630f96

  • SHA256

    55f2274f6fdcb8648d0f2ab0801cebfaa9f25ad69f63a30d61b80b835c60c633

  • SHA512

    4d7af2aed3533d407e14cba226edfbb5c3b29f233c1ea04df13c412fa0ddcc21517f236bf1ff1e890461c8f015b522e3205cffd4992e33228f81cb533d5431ba

  • SSDEEP

    1536:6WF3pp6ywFsckWYaNpLbtCq/4cXeXvubKrFEwMEwKhbArEwKhQL4cXeXvubKrb:6WVtwFsYNpHtCqwago+bAr+Qkay

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Extracted

Family

gozi

Targets

    • Target

      80db67cec959db1709d51f79337cd2a84ba678fb39f5b108dc9f5752f920126cN.exe

    • Size

      245KB

    • MD5

      323450b3f7f17610765a75aa7edda9de

    • SHA1

      a685864f30584b1d88a8a369393959b1c9630f96

    • SHA256

      55f2274f6fdcb8648d0f2ab0801cebfaa9f25ad69f63a30d61b80b835c60c633

    • SHA512

      4d7af2aed3533d407e14cba226edfbb5c3b29f233c1ea04df13c412fa0ddcc21517f236bf1ff1e890461c8f015b522e3205cffd4992e33228f81cb533d5431ba

    • SSDEEP

      1536:6WF3pp6ywFsckWYaNpLbtCq/4cXeXvubKrFEwMEwKhbArEwKhQL4cXeXvubKrb:6WVtwFsYNpHtCqwago+bAr+Qkay

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Berbew

      Berbew is a backdoor written in C++.

    • Berbew family

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Gozi family

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks