General
-
Target
1032-98-0x0000000010000000-0x000000001000E000-memory.dmp
-
Size
56KB
-
Sample
221020-pwe5zsdggq
-
MD5
6e05909fc3bacd7fd338bc9bed907b82
-
SHA1
a84370b1dbef0978e41bc681aa32268c48afc32b
-
SHA256
7e3e8836488acbaa1ca66ab6e784a71334125c722e1962ab0f13735eeac00f21
-
SHA512
07aa5608b19772962ded9c154ff032fcd8c06dc4ea7a437abdce85e62ec3dc7776259ec41b01592c1564d0efda7880e9dcd459f40f18eb18e25ba9f3e29691c8
-
SSDEEP
1536:KGBx3R60XApqlaPGhVMq2LpeReOb2Pmp:KGBZ00Xfl4OMq2LpeReS2+
Behavioral task
behavioral1
Sample
1032-98-0x0000000010000000-0x000000001000E000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1032-98-0x0000000010000000-0x000000001000E000-memory.dll
Resource
win10v2004-20220812-en
Malware Config
Extracted
gozi_ifsb
5000
config.edge.skype.com
onlinetwork.top
linetwork.top
-
base_path
/drew/
-
build
250246
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Targets
-
-
Target
1032-98-0x0000000010000000-0x000000001000E000-memory.dmp
-
Size
56KB
-
MD5
6e05909fc3bacd7fd338bc9bed907b82
-
SHA1
a84370b1dbef0978e41bc681aa32268c48afc32b
-
SHA256
7e3e8836488acbaa1ca66ab6e784a71334125c722e1962ab0f13735eeac00f21
-
SHA512
07aa5608b19772962ded9c154ff032fcd8c06dc4ea7a437abdce85e62ec3dc7776259ec41b01592c1564d0efda7880e9dcd459f40f18eb18e25ba9f3e29691c8
-
SSDEEP
1536:KGBx3R60XApqlaPGhVMq2LpeReOb2Pmp:KGBZ00Xfl4OMq2LpeReS2+
Score3/10 -