General
-
Target
600-57-0x0000000010000000-0x000000001000E000-memory.dmp
-
Size
56KB
-
Sample
221020-pmfedsdfc4
-
MD5
807798f015fc796141f95bb75f4aff3b
-
SHA1
d7a312ad2792afd930ebf064e653b3cec48cde3e
-
SHA256
f3b166c484c622948fc255e0848009829734b30e548aacb2b36e231e893fedd1
-
SHA512
1938beac40fdd3f8dfada694352daa9adf6101ff86cea59ff32d4fed3c3d5760b8abc420701b8f3e73fbde473467eec31672f9b10c7c6a33cec8c80c09824121
-
SSDEEP
768:A2gGmsx3R69vhvjyRpq63goMWPXE2bE/JVMq2LATqeeAeOu2D2wqmLiu6:KGBx3R6HApqlaPGhVMq2LpeReOb2Pmp
Behavioral task
behavioral1
Sample
600-57-0x0000000010000000-0x000000001000E000-memory.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
600-57-0x0000000010000000-0x000000001000E000-memory.dll
Resource
win10v2004-20220812-en
Malware Config
Extracted
gozi_ifsb
5000
config.edge.skype.com
onlinetwork.top
linetwork.top
-
base_path
/drew/
-
build
250246
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
600-57-0x0000000010000000-0x000000001000E000-memory.dmp
-
Size
56KB
-
MD5
807798f015fc796141f95bb75f4aff3b
-
SHA1
d7a312ad2792afd930ebf064e653b3cec48cde3e
-
SHA256
f3b166c484c622948fc255e0848009829734b30e548aacb2b36e231e893fedd1
-
SHA512
1938beac40fdd3f8dfada694352daa9adf6101ff86cea59ff32d4fed3c3d5760b8abc420701b8f3e73fbde473467eec31672f9b10c7c6a33cec8c80c09824121
-
SSDEEP
768:A2gGmsx3R69vhvjyRpq63goMWPXE2bE/JVMq2LATqeeAeOu2D2wqmLiu6:KGBx3R6HApqlaPGhVMq2LpeReOb2Pmp
Score3/10 -