General
-
Target
RNSM00281.7z
-
Size
8.3MB
-
Sample
241120-tlylssyfjb
-
MD5
b3cbda3981676b194a7913ac174b3051
-
SHA1
5945bbb76d5c488f49775e009cd44bbbc469ed09
-
SHA256
67c46af78643577175e2b0529cc9f6d4e90ee1dcb57db0a427cd8f648fb67d14
-
SHA512
bca3e77ce210be97098a7ca4878aa77689c5147a0f41cf70df11cf093aae866837455af2156bf8ee10fb756e103d15493e07767b854741de6f1cb0b65db604b3
-
SSDEEP
196608:gqeLVyehU5T52aFW+wBr3+O27mzaWD/5W+EFal9erizC3:SnhCTPwBKZ9Wr5qIHmiw
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00281.7z
Resource
win7-20241023-en
Malware Config
Extracted
gozi
Targets
-
-
Target
RNSM00281.7z
-
Size
8.3MB
-
MD5
b3cbda3981676b194a7913ac174b3051
-
SHA1
5945bbb76d5c488f49775e009cd44bbbc469ed09
-
SHA256
67c46af78643577175e2b0529cc9f6d4e90ee1dcb57db0a427cd8f648fb67d14
-
SHA512
bca3e77ce210be97098a7ca4878aa77689c5147a0f41cf70df11cf093aae866837455af2156bf8ee10fb756e103d15493e07767b854741de6f1cb0b65db604b3
-
SSDEEP
196608:gqeLVyehU5T52aFW+wBr3+O27mzaWD/5W+EFal9erizC3:SnhCTPwBKZ9Wr5qIHmiw
-
Gozi family
-
Contacts a large (7699) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indicator Removal
1File Deletion
1Pre-OS Boot
1Bootkit
1System Binary Proxy Execution
1Verclsid
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1