General
-
Target
RNSM00314.7z
-
Size
2.9MB
-
Sample
241112-ymxhcazene
-
MD5
26138e381f742d7fc61cc0fa315a41dc
-
SHA1
ce8e7265ea7327505059359ea56f1ba357d1b6ad
-
SHA256
94ed1eb77bd9cff40d865edad84a0034224588fc694dd756ee5967717083347c
-
SHA512
96ec6dbb1589c3622b1e55dd1f6a7b69b7108914b7a8f9213578238bf48931deff4367d124a268bb579e821821565b3ece6261cd17b04355f13ee5fa82b6ed82
-
SSDEEP
49152:FPsnlnPwN8V5295whbTYd9UYji6iYc7HDuRjSQCmkkIpXxRVTvzARRjor887+1G8:hIt4NU585whbsde56cGNC+0XxI8r/T4L
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00314.7z
Resource
win7-20241023-en
Malware Config
Extracted
gozi
Extracted
gozi
1032
okiweqwejqweijqwe.net
nnnvnvnasjdnqwe.net
iaihbqwhebqwehabsd.com
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
RNSM00314.7z
-
Size
2.9MB
-
MD5
26138e381f742d7fc61cc0fa315a41dc
-
SHA1
ce8e7265ea7327505059359ea56f1ba357d1b6ad
-
SHA256
94ed1eb77bd9cff40d865edad84a0034224588fc694dd756ee5967717083347c
-
SHA512
96ec6dbb1589c3622b1e55dd1f6a7b69b7108914b7a8f9213578238bf48931deff4367d124a268bb579e821821565b3ece6261cd17b04355f13ee5fa82b6ed82
-
SSDEEP
49152:FPsnlnPwN8V5295whbTYd9UYji6iYc7HDuRjSQCmkkIpXxRVTvzARRjor887+1G8:hIt4NU585whbsde56cGNC+0XxI8r/T4L
-
GandCrab payload
-
Gandcrab family
-
Gozi family
-
Troldesh family
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1