General
-
Target
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93
-
Size
2.5MB
-
Sample
241130-d7cy8azqbw
-
MD5
642a17854f3d6bfba19c14fe37d4330e
-
SHA1
3bfefe6bf91fe3743b64ca4fe643bf8c347e83c5
-
SHA256
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93
-
SHA512
d1b9bcd7f187763e308db2a18222bab10acd070afbe766d6231c2d34cf78e7716d0666a8dc1d986e74f8d93bdd6ede205fb472917de1398f8763adcb78a89db9
-
SSDEEP
49152:S+ggKOb+Hqoo3gU9DPjOP+9Rq1S78JgxVJ9y9EvpoWoGODTPnAlm26TKY5:Dg2KK3z9OP+9Rqc7zJy9QoLalc
Behavioral task
behavioral1
Sample
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93.exe
Resource
win7-20240903-en
Malware Config
Extracted
gozi
Targets
-
-
Target
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93
-
Size
2.5MB
-
MD5
642a17854f3d6bfba19c14fe37d4330e
-
SHA1
3bfefe6bf91fe3743b64ca4fe643bf8c347e83c5
-
SHA256
c688aae516ace671f7fa824fdec8bd707c372ca848940bc1892395f8ebbedb93
-
SHA512
d1b9bcd7f187763e308db2a18222bab10acd070afbe766d6231c2d34cf78e7716d0666a8dc1d986e74f8d93bdd6ede205fb472917de1398f8763adcb78a89db9
-
SSDEEP
49152:S+ggKOb+Hqoo3gU9DPjOP+9Rq1S78JgxVJ9y9EvpoWoGODTPnAlm26TKY5:Dg2KK3z9OP+9Rqc7zJy9QoLalc
-
Blackmoon family
-
Detect Blackmoon payload
-
Gozi family
-
Xmrig family
-
XMRig Miner payload
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1