General

  • Target

    8eddbb86c3e2733a2a8f0299019bdbdb2ef479a264cac47628b6f294d1d0a90f

  • Size

    3.6MB

  • Sample

    240623-b5d3dsydjq

  • MD5

    dd90cc192b0638b05a47efd020749ba6

  • SHA1

    6ba0309e3480cc7fae8ac8afc4a46f009ad99bb4

  • SHA256

    8eddbb86c3e2733a2a8f0299019bdbdb2ef479a264cac47628b6f294d1d0a90f

  • SHA512

    890960699a882c73a7d98f14168124d1be044ea4c0d7adb4ac38615ba7576ab840db42220a7a8e79c3c15042d90e0e48057ac45bb2650777fd8bc16dd3527f18

  • SSDEEP

    49152:DEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWE:DEjlmQbfgSgwvSnN4iVJuk0xJgnqM

Malware Config

Extracted

Family

gozi

Targets

    • Target

      8eddbb86c3e2733a2a8f0299019bdbdb2ef479a264cac47628b6f294d1d0a90f

    • Size

      3.6MB

    • MD5

      dd90cc192b0638b05a47efd020749ba6

    • SHA1

      6ba0309e3480cc7fae8ac8afc4a46f009ad99bb4

    • SHA256

      8eddbb86c3e2733a2a8f0299019bdbdb2ef479a264cac47628b6f294d1d0a90f

    • SHA512

      890960699a882c73a7d98f14168124d1be044ea4c0d7adb4ac38615ba7576ab840db42220a7a8e79c3c15042d90e0e48057ac45bb2650777fd8bc16dd3527f18

    • SSDEEP

      49152:DEjEamQb2OguN8Dfk5JEG14wv2QwnN4iTapOcaPKfjtD8cEOxeuxzS2hPV5T1gWE:DEjlmQbfgSgwvSnN4iVJuk0xJgnqM

    Score
    7/10
    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks