General

  • Target

    a4e3b205523d28cb8482729675d70e1cf88d81f0081825fecf86274b07ea1578

  • Size

    42KB

  • MD5

    8228ee6b537209f37b61def0fed70896

  • SHA1

    5eebb557b3597a55d0637b9facc64188ec302b42

  • SHA256

    a4e3b205523d28cb8482729675d70e1cf88d81f0081825fecf86274b07ea1578

  • SHA512

    adcc34a7f5676cabf3708f035c401ee48ba46fe3494036db9e2a74af84b273a260b0cc4f21b38f3ed4a0e849c5116fdaf6dd4a0f1003d028782ef9df343c9a77

  • SSDEEP

    768:ZM7PHMmVNODkaS3GZBPnlrdVlec/ofGUayvJufsOUbMKhsfka5aV0OIriXa34OP:6MmiO3GZBv1hzOtayvofsOUb48aHO89

Score
10/10

Malware Config

Extracted

Family

gozi_rm3

Botnet

210307

C2

https://sonak.cyou

Attributes
  • build

    300960

  • exe_type

    loader

  • non_target_locale

    RU

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
aes.plain

Signatures

Files

  • a4e3b205523d28cb8482729675d70e1cf88d81f0081825fecf86274b07ea1578
    .dll regsvr32 windows x86

    ca093b3502dd9834e23c84e3b034b2ae


    Code Sign

    Headers

    Imports

    Exports

    Sections