General
-
Target
RNSM00276.7z
-
Size
4.1MB
-
Sample
241122-vs4basvkft
-
MD5
39fb6bc4ba8a5113f3c9ef47e229e92b
-
SHA1
aaaa278089a53fd91d9ec5fd3e4baec2e9a57c28
-
SHA256
e135b3e7b476bb122662a05c539f79fe49d827871232835c708952a4df95ce4b
-
SHA512
016db01d77520c9fa21a696cb03c6239da6a458499e0f2db217e9f41305150b2eff4b98366e5c58793db85453da2b8593d37e3ba4ff6e3595ee96181fd64eef8
-
SSDEEP
98304:qVOn1PxwzMhM512CUclkyBcYDpdQysDyKu3xXN7zX:qVjzMWLrUclkkk6fBJL
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00276.7z
Resource
win7-20241010-en
Malware Config
Extracted
gozi
Extracted
C:\Users\Default\How To Recover Encrypted Files.hta
<b>[email protected]</b>.<br>In
18prjukrWtNRdKXtZLwL7bUgk6J5kkVWMH
Targets
-
-
Target
RNSM00276.7z
-
Size
4.1MB
-
MD5
39fb6bc4ba8a5113f3c9ef47e229e92b
-
SHA1
aaaa278089a53fd91d9ec5fd3e4baec2e9a57c28
-
SHA256
e135b3e7b476bb122662a05c539f79fe49d827871232835c708952a4df95ce4b
-
SHA512
016db01d77520c9fa21a696cb03c6239da6a458499e0f2db217e9f41305150b2eff4b98366e5c58793db85453da2b8593d37e3ba4ff6e3595ee96181fd64eef8
-
SSDEEP
98304:qVOn1PxwzMhM512CUclkyBcYDpdQysDyKu3xXN7zX:qVjzMWLrUclkkk6fBJL
-
Cerber family
-
Gozi family
-
Troldesh family
-
Contacts a large (592) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
4Discovery
Network Service Discovery
1Peripheral Device Discovery
2Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1