Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Haag's Hunt for Gozi Gremlins #3052

Merged
merged 12 commits into from
Jul 26, 2024
1 change: 1 addition & 0 deletions detections/endpoint/bitsadmin_download_file.yml
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ tags:
- DarkSide Ransomware
- Living Off The Land
- Flax Typhoon
- Gozi Malware
asset_type: Endpoint
confidence: 70
impact: 70
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,7 @@ tags:
- Qakbot
- CISA AA22-277A
- CISA AA23-347A
- Gozi Malware
asset_type: Endpoint
confidence: 80
impact: 70
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/cobalt_strike_named_pipes.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ tags:
- BlackByte Ransomware
- Graceful Wipe Out Attack
- LockBit Ransomware
- Gozi Malware
asset_type: Endpoint
confidence: 90
impact: 80
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ tags:
analytic_story:
- Suspicious MSHTA Activity
- Living Off The Land
- Gozi Malware
asset_type: Endpoint
confidence: 100
impact: 90
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ tags:
- Insider Threat
- Command And Control
- Ransomware
- Gozi Malware
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ tags:
- Insider Threat
- Command And Control
- Ransomware
- Gozi Malware
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,7 @@ tags:
- Insider Threat
- Command And Control
- Ransomware
- Gozi Malware
asset_type: Endpoint
confidence: 50
impact: 50
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ tags:
analytic_story:
- Active Directory Discovery
- CISA AA22-320A
- Gozi Malware
asset_type: Endpoint
confidence: 50
impact: 30
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ tags:
- Graceful Wipe Out Attack
- Industroyer2
- Data Destruction
- Gozi Malware
asset_type: Endpoint
confidence: 70
impact: 90
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ tags:
- Graceful Wipe Out Attack
- Industroyer2
- Data Destruction
- Gozi Malware
asset_type: Endpoint
atomic_guid: []
confidence: 70
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/powershell_start_bitstransfer.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ references:
tags:
analytic_story:
- BITS Jobs
- Gozi Malware
asset_type: Endpoint
confidence: 80
impact: 70
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,7 @@ tags:
- Qakbot
- IcedID
- Amadey
- Gozi Malware
asset_type: Endpoint
confidence: 90
impact: 70
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ references:
tags:
analytic_story:
- Windows Discovery Techniques
- Gozi Malware
asset_type: Windows
confidence: 50
impact: 30
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ tags:
- Chaos Ransomware
- NjRAT
- RedLine Stealer
- Gozi Malware
asset_type: Endpoint
confidence: 90
impact: 90
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ tags:
analytic_story:
- Active Directory Kerberos Attacks
- Active Directory Privilege Escalation
- Gozi Malware
asset_type: Endpoint
confidence: 100
impact: 80
Expand Down
1 change: 1 addition & 0 deletions detections/endpoint/windows_iso_lnk_file_creation.yml
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,7 @@ tags:
- Remcos
- Warzone RAT
- Amadey
- Gozi Malware
asset_type: Endpoint
confidence: 50
impact: 80
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,7 @@ tags:
- Azorult
- Remcos
- Warzone RAT
- Gozi Malware
asset_type: Endpoint
confidence: 80
impact: 50
Expand Down
25 changes: 25 additions & 0 deletions stories/gozi_malware.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
name: Gozi Malware
id: a7332538-bb18-421e-874e-a20c9fcc34e7
version: 1
date: '2024-07-24'
author: Michael Haag, Splunk
description: This analytic story covers the detection and analysis of Gozi malware, also known as Ursnif or ISFB. Gozi is one of the oldest and most persistent banking trojans, with a history dating back to 2000. It has undergone numerous evolutions and code forks, resulting in several active variants in recent years.
narrative: 'Gozi malware, first observed in 2006, has a complex lineage tracing back to the Ursnif/Snifula spyware from 2000. Over the years, it has evolved from a simple spyware to a sophisticated banking trojan, offered as Crimeware-as-a-Service (CaaS). Recent variants like Dreambot, IAP, RM2, RM3, and LDR4 demonstrate its ongoing development and threat.

A typical Gozi infection may begin with a malicious ISO file delivery. Once executed, the malware conducts automatic discovery on the infected host and establishes persistence through registry run keys. In more advanced attacks, Gozi can serve as an initial access point for further malicious activities, including the deployment of additional payloads like Cobalt Strike.

Post-infection activities may include credential theft, lateral movement, and the use of legitimate tools for persistence and remote access. Threat actors often leverage Gozi infections to conduct extensive reconnaissance, move laterally within networks, and potentially prepare for more severe attacks such as data exfiltration or ransomware deployment.

Detection strategies should focus on identifying suspicious ISO files, unusual process executions (especially involving renamed system utilities), registry modifications, and network communications associated with Gozi''s command and control infrastructure. Additionally, monitoring for post-exploitation activities such as credential dumping, lateral movement attempts, and the deployment of remote management tools can help in early detection and mitigation of Gozi-related threats.'
references:
- https://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
- https://thedfirreport.com/2023/01/09/unwrapping-ursnifs-gifts/
tags:
category:
- Adversary Tactics
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
usecase: Advanced Threat Detection
cve: []
Loading