General

  • Target

    e2003163079e31aed7450619794d534d7a74e08115ca91f702f75d4d23ae21c3

  • Size

    163KB

  • Sample

    240702-e1v2wszanm

  • MD5

    a7b9b914007f623333c417480133c325

  • SHA1

    d248a6ada8086dab59b918a52ed64fbcdbbd1193

  • SHA256

    e2003163079e31aed7450619794d534d7a74e08115ca91f702f75d4d23ae21c3

  • SHA512

    8bc494927d0f8abdaec9eb72dd9a40777d9053672aac7288775b8a9e385f7217759273d7899d691061e58635cae31e155d4a9a9d98774edb39c8c13126bc4c58

  • SSDEEP

    3072:sOs7wBO4h0nF3rjBO5Mli0ltOrWKDBr+yJb:sbwNh+rjBJU0LOf

Malware Config

Extracted

Family

gozi

Targets

    • Target

      e2003163079e31aed7450619794d534d7a74e08115ca91f702f75d4d23ae21c3

    • Size

      163KB

    • MD5

      a7b9b914007f623333c417480133c325

    • SHA1

      d248a6ada8086dab59b918a52ed64fbcdbbd1193

    • SHA256

      e2003163079e31aed7450619794d534d7a74e08115ca91f702f75d4d23ae21c3

    • SHA512

      8bc494927d0f8abdaec9eb72dd9a40777d9053672aac7288775b8a9e385f7217759273d7899d691061e58635cae31e155d4a9a9d98774edb39c8c13126bc4c58

    • SSDEEP

      3072:sOs7wBO4h0nF3rjBO5Mli0ltOrWKDBr+yJb:sbwNh+rjBJU0LOf

    • Adds autorun key to be loaded by Explorer.exe on startup

    • Gozi

      Gozi is a well-known and widely distributed banking trojan.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks