Behavioral task
behavioral1
Sample
1088-100-0x00000000002E0000-0x0000000000374000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1088-100-0x00000000002E0000-0x0000000000374000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1088-100-0x00000000002E0000-0x0000000000374000-memory.dmp
-
Size
592KB
-
MD5
90c45f76d5a402997b4fa3f4b0a819e3
-
SHA1
90905ffbdc196cf6c818c6e5c50baf1dab4fad2f
-
SHA256
2a99a903cb89717f75945c34cdb785c3cf5b99fa3e38c995fb556239681a119d
-
SHA512
f9b027c4e58001e77356ce7bc30195755de4ea01ee448fcb3773036683e9c38be3a3b8e59e6818068d6e1d1a99aa981162fc75adda9002c00c45a380eb04e345
-
SSDEEP
768:i2xO/MHJN5YvtyUJQs2Jl0QbUYHwd3aQD/I64VikpA2HkcSt+y:NOkHJXsr2Jl0QbUp3LH4tpA2Ec
Malware Config
Extracted
gozi
Extracted
gozi
50000
http://confisg.edges.skype.com
http://108.61.165.145
http://37.120.222.23
http://194.76.224.234
http://176.10.111.47
-
base_path
/grome/
-
build
250249
-
exe_type
loader
-
extension
.chk
-
server_id
50
Signatures
-
Gozi family
Files
-
1088-100-0x00000000002E0000-0x0000000000374000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 604B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ