General
-
Target
2000-58-0x0000000000210000-0x000000000028F000-memory.dmp
-
Size
508KB
-
Sample
221123-lsv59acb93
-
MD5
2a5bd7b2ad26272a636e387cdfe57a11
-
SHA1
e8687d7783ad3900d80618a4b229f62e14ddcb6c
-
SHA256
e824bb212b6dd4c8b9a7e7454ef8dd6148d23af26e1fa81a7c0db6c4c3d13fcf
-
SHA512
812c1cf31e7de5ba3b50b72750d7db1ee962af69c4fd3054ef647dfff0cb62dd68fab05800ceb052392cc0d03dc695a53cf79e59cfb8e9ff22a345ca25a099e5
-
SSDEEP
768:D2Z7fteeACqv3yOPstw7V/O3K3SMgq+c/:SrtejD8kVW2RE4
Behavioral task
behavioral1
Sample
2000-58-0x0000000000210000-0x000000000028F000-memory.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2000-58-0x0000000000210000-0x000000000028F000-memory.dll
Resource
win10v2004-20220812-en
Malware Config
Extracted
gozi
Extracted
gozi
5050
config.edge.skype.com
meganetwork.top
supernetwork.top
internetcoca.in
31.207.46.124
139.60.163.161
dendexmm.com
-
base_path
/jerry/
-
build
250249
-
exe_type
loader
-
extension
.bob
-
server_id
50
Targets
-
-
Target
2000-58-0x0000000000210000-0x000000000028F000-memory.dmp
-
Size
508KB
-
MD5
2a5bd7b2ad26272a636e387cdfe57a11
-
SHA1
e8687d7783ad3900d80618a4b229f62e14ddcb6c
-
SHA256
e824bb212b6dd4c8b9a7e7454ef8dd6148d23af26e1fa81a7c0db6c4c3d13fcf
-
SHA512
812c1cf31e7de5ba3b50b72750d7db1ee962af69c4fd3054ef647dfff0cb62dd68fab05800ceb052392cc0d03dc695a53cf79e59cfb8e9ff22a345ca25a099e5
-
SSDEEP
768:D2Z7fteeACqv3yOPstw7V/O3K3SMgq+c/:SrtejD8kVW2RE4
Score3/10 -