General
-
Target
1052-57-0x0000000010000000-0x000000001000E000-memory.dmp
-
Size
56KB
-
Sample
220812-drxzfsgabq
-
MD5
d6a2b83d6e45fd9f293697daf476375a
-
SHA1
550a540eb4cb1517e97996c178938fca04d18019
-
SHA256
d517cdd60aeab77ac16e93047ce2f4e737ae509046834c26487986e92c6906dd
-
SHA512
8885873d1d723063c943deeaecb095b522410acec2585642b8d7cf6ffa1303f960a476a0245b4e9988af48f56fcec830d2d473bdda39cd69796d9f913f7a7956
Behavioral task
behavioral1
Sample
1052-57-0x0000000010000000-0x000000001000E000-memory.dll
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
1052-57-0x0000000010000000-0x000000001000E000-memory.dll
Resource
win10v2004-20220721-en
Malware Config
Extracted
gozi_ifsb
3000
config.edge.skype.com
79.110.52.8
79.110.52.80
193.106.191.163
-
base_path
/drew/
-
build
250240
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
1052-57-0x0000000010000000-0x000000001000E000-memory.dmp
-
Size
56KB
-
MD5
d6a2b83d6e45fd9f293697daf476375a
-
SHA1
550a540eb4cb1517e97996c178938fca04d18019
-
SHA256
d517cdd60aeab77ac16e93047ce2f4e737ae509046834c26487986e92c6906dd
-
SHA512
8885873d1d723063c943deeaecb095b522410acec2585642b8d7cf6ffa1303f960a476a0245b4e9988af48f56fcec830d2d473bdda39cd69796d9f913f7a7956
Score3/10 -