Resubmissions

20/02/2025, 15:48

250220-s8zlyayjdl 10

20/02/2025, 14:12

250220-rh9hsawmhw 10

26/10/2022, 23:52

221026-3wxa6aaag3 10

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2025, 14:12

General

  • Target

    026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe

  • Size

    302KB

  • MD5

    f870c0d62691fc39194922e4a59fdc1c

  • SHA1

    69369a1aa35592ca4eede5179060f2c58e9bae6e

  • SHA256

    026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44

  • SHA512

    92a452a2f63e9e214f98d14fcee1dd8f8c55b94ce90ed541986af08117f09779e159f76ae043ab6be4c49d254e4846448b632e0f33fcafb0be362a90a1a934ae

  • SSDEEP

    6144:qTBSsdUvHN91B8LdCCoVupEo5KdEBaxRxnxXOWFi2HAwsih5:oUJvHNnBGdpOupzEdEByxW2g

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1010

C2

sys.cwthecw.com/bcms/assets/img

sys.whyblacklivesmatter.org/bcms/assets/img

sys.mohitsagarmusic.com/bcms/assets/img

lansystemstat.com/bcms/assets/img

highnetwork.pw/bcms/assets/img

lostnetwork.in/bcms/assets/img

sysconnections.net/bcms/assets/img

lansupports.com/bcms/assets/img

Attributes
  • exe_type

    worker

  • server_id

    35

rsa_pubkey.plain
serpent.plain

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Gozi family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
    "C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe
      "C:\Users\Admin\AppData\Local\Temp\026fd6ab8b5f12d1ae0795f7ad79b05a7ca1dc83e996cb7ee37f1b417d66de44.exe"
      2⤵
        PID:2024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2024-0-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2024-2-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2024-3-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB

    • memory/2024-4-0x0000000000400000-0x0000000000439000-memory.dmp

      Filesize

      228KB