General
-
Target
RNSM00275.7z
-
Size
7.0MB
-
Sample
241122-vxyxdazrgr
-
MD5
8656d8583cbacf028910947a2d80b3fa
-
SHA1
d83fffb694eb27f434eae8f29e7f495a3c3a5c59
-
SHA256
e1c89f5b482e75e1fc766986357e478c670ab87a415fe25a80bf8b1852f2c367
-
SHA512
8fb1b81484bb5c20fec83073761b12165c4ade7d716f522f1d0a73d0ece3e7b458e85ce54ae7c33f1861a5126554aa0988e4523a5163378cad140f3f72d60bb2
-
SSDEEP
196608:57RdJrgtIAwwmEz46Hyp0248n43vmnVJl4s2v:VRdFSLYp3Cvmn7+sU
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00275.7z
Resource
win7-20241010-en
Malware Config
Extracted
gozi
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+hvkav.txt
http://t54ndnku456ngkwsudqer.wallymac.com/38762F6F846837E1
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/38762F6F846837E1
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/38762F6F846837E1
http://xlowfznrg4wf7dli.onion/38762F6F846837E1
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+hvkav.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/19231476997B99E
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/19231476997B99E
http://5rport45vcdef345adfkksawe.bematvocal.at/19231476997B99E
http://xlowfznrg4wf7dli.onion/19231476997B99E
http://xlowfznrg4wf7dli.ONION/19231476997B99E
Targets
-
-
Target
RNSM00275.7z
-
Size
7.0MB
-
MD5
8656d8583cbacf028910947a2d80b3fa
-
SHA1
d83fffb694eb27f434eae8f29e7f495a3c3a5c59
-
SHA256
e1c89f5b482e75e1fc766986357e478c670ab87a415fe25a80bf8b1852f2c367
-
SHA512
8fb1b81484bb5c20fec83073761b12165c4ade7d716f522f1d0a73d0ece3e7b458e85ce54ae7c33f1861a5126554aa0988e4523a5163378cad140f3f72d60bb2
-
SSDEEP
196608:57RdJrgtIAwwmEz46Hyp0248n43vmnVJl4s2v:VRdFSLYp3Cvmn7+sU
-
Gozi family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Contacts a large (669) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1