www.hawk-eye.io Open in urlscan Pro
92.205.89.230  Public Scan

URL: https://www.hawk-eye.io/2022/11/ursnif-gozi-malware-evolution-and-associated-ioc/
Submission: On May 08 via api from US — Scanned from FR

Form analysis 2 forms found in the DOM

GET https://www.hawk-eye.io/

<form role="search" method="get" class="search-form" id="searchform" action="https://www.hawk-eye.io/">
  <label>
    <span>Search for:</span>
    <input type="search" class="search-field" placeholder="To search type and hit enter" value="" name="s" title="Search for:">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

POST /2022/11/ursnif-gozi-malware-evolution-and-associated-ioc/#wpcf7-f4946-o1

<form action="/2022/11/ursnif-gozi-malware-evolution-and-associated-ioc/#wpcf7-f4946-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
  <div style="display: none;">
    <input type="hidden" name="_wpcf7" value="4946">
    <input type="hidden" name="_wpcf7_version" value="5.7.5.1">
    <input type="hidden" name="_wpcf7_locale" value="en_US">
    <input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f4946-o1">
    <input type="hidden" name="_wpcf7_container_post" value="0">
    <input type="hidden" name="_wpcf7_posted_data_hash" value="">
    <input type="hidden" name="_wpcf7_recaptcha_response"
      value="03AL8dmw-21RSF4UmH3yi488pBbzpEKOvq9oRUSBigoRSsTNdutu57uMlmB5t6QBV6kLslVzqNq8NZpe83CPxsOE4SWrHnPJzjwuHjjE6MBbYFPvYp7qMRalqIn6uh4QyxT4Jgv0Qqm7wd6F0tlslDrP3wy6t8XZ9rgMxE_PsM_1wJXaJkdHYEV55P8qX4a112bEIJv0dJ3M3EBFbC2TKS9gWlNj3AyPRYLLt2cxOYYTRPqrr3m4H1mN0EEPfEaJMVLxwkEg1bRjrGRkt-fgcmbjqub6fV66P7m3Pbby2Gnzjop9AlNdlsS4zlZmhPHNQgudNI7HZR4g69f7q2KYmgFiVVh20r9sQeRMA_4q6bYDQtJbJfovRVAHeaaoZxiy-TyKyqmbFXc8PoC_tWcbVa684QavoGAvf9fC8B8MLxSQRXFuSwFENDH-gG8ePdFY_tXwbYe2YZQa6UQ6CP_db_7YLYZ4sNjjeZAv_E1Zv5R2GN0nuUYSCxu0Hh6yp9to5mWxMtrZ5_tQGwLBH6hV1AFgoYTigfMTzdJKHzlLfbWvlUddK4238tf7o">
  </div>
  <p><label> Your Name (required)<br>
      <span class="wpcf7-form-control-wrap" data-name="your-name"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-validates-as-required" aria-required="true" aria-invalid="false" value="" type="text" name="your-name"></span> </label>
  </p>
  <p><label> Your Email (required)<br>
      <span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-text wpcf7-email wpcf7-validates-as-required wpcf7-validates-as-email" aria-required="true" aria-invalid="false" value="" type="email"
          name="your-email"></span> </label>
  </p>
  <p><label> Subject<br>
      <span class="wpcf7-form-control-wrap" data-name="your-subject"><input size="40" class="wpcf7-form-control wpcf7-text" aria-invalid="false" value="" type="text" name="your-subject"></span> </label>
  </p>
  <p><label> Your Message<br>
      <span class="wpcf7-form-control-wrap" data-name="your-message"><textarea cols="40" rows="10" class="wpcf7-form-control wpcf7-textarea" aria-invalid="false" name="your-message"></textarea></span> </label>
  </p>
  <p><input class="wpcf7-form-control has-spinner wpcf7-submit" type="submit" value="Send"><span class="wpcf7-spinner"></span>
  </p>
  <p style="display: none !important;"><label>Δ<textarea name="_wpcf7_ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="_wpcf7_ak_js" value="1683580918191">
    <script>
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
  <div class="wpcf7-response-output" aria-hidden="true"></div>
</form>

Text Content

 * Home
 * SOC As A Service
   * Features
   * Capabilities
   * Process
 * Packages
   * Remote
   * Lite
   * Baseline
   * Advanced
   * Premium
   * ICS / OT
 * CSOC WIKI
 * Cyber Attack Kill Chain
 * Blog
 * Careers
 * Partner Program
 * Contact


 * Home
 * SOC As A Service
   * Features
   * Capabilities
   * Process
 * Packages
   * Remote
   * Lite
   * Baseline
   * Advanced
   * Premium
   * ICS / OT
 * CSOC WIKI
 * Cyber Attack Kill Chain
 * Blog
 * Careers
 * Partner Program
 * Contact


25 Nov 2022
HAWKEYE Cyber Security, Malware Protection, Managed SOC Services, Security
Operations Center
November 25, 2022 HAWKEYE


URSNIF/GOZI MALWARE EVOLUTION AND ASSOCIATED IOC



Gozi is a powerful piece of malware with a wide range of intricate
characteristics. It began as a basic banking Trojan, even more, basic in some
ways than the original Zeus due to the notable absence of web injection
features.





Background:

It should come as no surprise that URSNIF (also known as Gozi or Gozi/ISFB),
which is occasionally entangled with other malware families and variants, has a
long and eventful history given that it is one of the oldest banking malware
families still active today. Since the first major version debuted in 2016, its
source code has been leaked at least twice, leading to further variations,
several of which are still in use today (e.g., IAP). Numerous URSNIF variations
based on ISFB have been spotted in the wild recently, including Dreambot, IAP,
RM2, RM3, and LDR4. In this article, We shall step-by-step dissect the evolution
of Gozi and the associated IOCs.

Evolution of Gozi:

Gozi is a powerful piece of malware with a wide range of intricate
characteristics. It began as a basic banking Trojan, even more, basic in some
ways than the original Zeus due to the notable absence of web injection
features. Gozi went unnoticed for its first year of operation; it wasn’t until a
2007 SecureWorks expose, which included a breakdown of the malware’s internal
structure and the nature of the underlying financial operation, that this strain
of malware came to the public’s attention. Similar to Emotet, Gozi developed
into a multi-module, multi-purpose malicious platform, and as of 2020, many of
the contemporary variants of Kuzmin’s original work are still actively being
used in malicious campaigns.

2010 Leak:

After its 2007 public release, Gozi remained a typical malicious campaign for
three more years, with a single codebase limited to a small, exclusive group of
cyber criminals. Then, in 2010, the sources for this initial Gozi version—then
known as Gozi CRM—leaked. Gozi Prinimalka and Gozi “ISFB,” were the two new
versions developed by other actors using the leaked code. Even just these early
mutations made it difficult for the industry to monitor Gozi. ISFB was referred
to as “Gozi2” by one vendor, and “Ursnif,” or “Snifula,” by others. As a result
of a packer that was frequently used to conceal the virus’s binaries, a number
of other vendors began calling the malware “Rovnix.”

2015 Leak:

A few years later, the ISFB source code was leaked. Although sources disagree on
the exact timing, the majority of the evidence dates this second leak to 2015.
One of the resulting branches later merged with Nymaim and became the basic code
for GozNym, the hybrid malware strain created by the union of the two malware
families. Another branch eventually evolved into Dreambot, which modified the
check-in format of ISFB and supported C&C communication over the TOR network.
Dreambot mainly relied on the code from the original 2010 CRM breach.

Some actors believed that the market was ready for a new major version once
second-wave Gozi had been present for long enough. As a result, Goziv3 (RM3
loader), ISFB3, and Gozi2RM3 were created (IAP 2.0). Each of them made
modifications to the malware’s C&C communication protocol, control flow, and
obfuscation technique. These “third-wave Gozi” campaigns were particularly
distinguished by the addition of novelties including signed binaries, HTTPS
connectivity, and a tiered, two-stage client registration process.

Variants of Gozi/Urnsif:

 * Dreambot:
   It wasn’t long after the ISFB breach that this particular branch of the
   leaked ISFB sources was discovered. It continued to be actively developed for
   a long time and incorporated numerous new features. It was reliant on C2
   check-ins replicating GET requests for images, a tactic that rapidly lost
   usefulness once it was discovered, and it was outclassed by third-wave Gozi’s
   sophisticated stealth operation best practices. After a lengthy and
   successful run, Dreambot came to an end in March 2020.
   
   
   
   * -> IOCs:
     * 52cb2bd9724270b3efe575894112d0a866734856a3257ddcfb24308e42861f6a
     * f2556099982b2b1ebea7443c863b8b205b6683112624f46393454e430e69aed5
 * Goziat:
   This Gozi variant seems to have made its debut several years after the ISFB
   leak. Its C&C check-in peculiarity, which can be modified during the
   malware’s creation process, uses a different resource directory in place of
   “images” and makes it stand apart from other variants. Goziat abandons the
   Dreambot-popularized “image file extensions as encoded requests” technique
   since it does not try to pretend that its check-in is a valid request for an
   image.
   
   
   
   * -> IOCs:
     * cb4f92bf9fef3708e7aeba5d8994a0502952d06374c8a83ff2c1ee0b7e603d35
     * c486d8579308999b7d9f8cbb6de33b7a3976b9db5b98c06b7744adf5d5d11caf
 * Goziv2:
   The campaign infrastructure level of Gozi2RM3 and earlier-generation Gozi
   executes a thorough vetting procedure, which is the most noticeable
   distinction between the two. Although these variations in infrastructure are
   the most significant ones, there are some functional variations as well.
   
   
   
   * -> IOCs:
     * c2ee9cf24f0bddb07914503dbae35c4497d66f9ca01ea65108ef40ff13cbec02
     * 81734690442c224cf104fba0db8bacabdf3dc347bba3da3415a92de587df6d82
 * Goziv3:
   Since at least the summer of 2017, this variety has been spotted in wild.
   Most of the ISFB code is still present, but there are also many new
   components. This variant’s attackers are fairly skilled and make an effort to
   remain undetected while primarily targeting the USA, Australia, and Italy.
   
   
   
   * -> IOCs:
     * 41e52cec2091e4451beadad93c5f693d5a008cf56eaf160f9fa4d577b1d707f6
     * a353dfb1b5eb69808244356cf9a784181c53eea2cb3f254749fa19c307c30cfc
 * ISFB3:
   During the years 2018–2019, this version was only very briefly and precisely
   used against Japanese targets. It has been assumed that it is connected to
   threat actor TA544 because of a similarity in its distribution technique.
   
   
   
   * -> IOCs:
     * cacc1c3af8ad58b992c707bdf36ec1bd5f039dd80780ad2978cb142ccfe714d6
     * 8d7ffebb0774e0dfe9d85f175cd5e1800dfd757bb5fbc4565a8f8a173e739ea5
 * LDR4:
   This URSNIF malware variant was originally discovered in June 2022. As
   opposed to earlier versions of URSNIF, this new variant, called LDR4, is a
   generic backdoor (similar to the short-lived SAIGON variant), which may have
   been created specifically to support activities like ransomware and data
   theft extortion.
   
   
   
   * -> IOCs:
     * 360417f75090c962adb8021dbb478f67
     * 58169007c2e7a0d022bc383f9b9476fe


Gozi, IoC, Malware, Managed SOC Dubai, Managed SOC UAE, Ursnif
 * Search for:


 * RECENT POSTS
   
   * Rogue NuGet Packages – The Rise of Supply Chain Risks
   * Ragnar Locker Ransomware
   * Threat Hunting Unauthorized RDP Post-Exploitation
   * How SBOM Plays a Key Role in CSOC
   * Rise in ICS Vulnerabilities


 * ARCHIVES
   
   * May 2023
   * April 2023
   * March 2023
   * February 2023
   * January 2023
   * December 2022
   * November 2022
   * October 2022
   * September 2022
   * August 2022
   * July 2022
   * June 2022
   * April 2022
   * March 2022
   * February 2022
   * January 2022
   * December 2021
   * November 2021
   * October 2021
   * September 2021
   * August 2021
   * March 2021
   * February 2021
   * January 2021
   * December 2020
   * November 2020
   * August 2020
   * June 2020
   * May 2020
   * April 2020
   * September 2019
   * June 2019
   * May 2019


 * CATEGORIES
   
   * Advanced Persistent Threat
   * Alert Advisory
   * Azure Sentinel
   * Breach Detection
   * Compromise Assessment
   * Cyber Security
   * Cyber Threat Intelligence
   * Cyber Threat Management
   * DARKINT
   * EDR
   * Email Security
   * Incident Response
   * Machine Learning
   * Malware Protection
   * Managed Security Services
   * Managed SOC Services
   * Middle East
   * News
   * OSINT
   * Ransomware Protection
   * Reconnaissance Tools
   * Security Operations Center
   * Security Orchestration
   * SIEM
   * SOAR
   * Threat Hunting
   * Threat Intelligence
   * Threat Modeling
   * UEBA
   * Vulnerability Assessment
   * XDR


 * TAGS
   
   Advanced Persistent Threat APT Azure Security Azure Sentinel Coronavirus
   COVID-19 CVE Cyber Attacks Cyber Security Cyber Threat Intelligence Emotet
   Endpoint Security ICS Incident Response LSASS Machine Learning Malware
   Managed SOC Managed SOC Abu Dhabi Managed SOC Bahrain Managed SOC Dubai
   Managed SOC Kuwait Managed SOC London Managed SOC UAE Microsoft OSINT
   Ransomware RCE RDP Security Operations Security Operations Center Security
   Orchestration SIEM SOAR SOC Threat Detection and Response Threat Hunting
   Threat Intelligence Threat Modeling Typosquatting Vulnerabilities
   Vulnerability Windows Event Forwarding XDR Zero Day






CONTACT US

We welcome you to contact us for more information
about HAWKEYE - SOC As A Service.




VISIT HAWKEYE CYBER SECURITY CENTER

Address: Office 4, Oasis Center, Sheikh Zayed Road, Dubai, United Arab Emirates

Phone: +971 4 338 3365

Email: hawkeye@dts-solution.com

 


LET'S GET SOCIAL




CONTACT US



Your Name (required)


Your Email (required)


Subject


Your Message




Δ







WE CYBER SECURITY


HAWKEYE - SOC As A Service powered by DTS Solution HAWKEYE POWERED BY United
Themes™