General

  • Target

    2912-143-0x0000000002010000-0x00000000020A5000-memory.dmp

  • Size

    596KB

  • MD5

    6f0ec2f0f5df6d78cda1f496f88cc248

  • SHA1

    0a90a0c090fa9769972dd51707af3420118f68f0

  • SHA256

    7231d63f1c6914f1157ea881486ff22d0c4d37be8064032d01d3b1193207b9a0

  • SHA512

    6d6dc17aaf616480d724da4c6ae174de1e58c132f957a6dc482eeccaedbc9e52c3f73e86f1d92194404f5dbcdaff267967c2a46247aa7b65eb9e3155e1d8bd5b

  • SSDEEP

    768:L2ZrpI1MOJvqywyV34OB9bl5n+iRjn9P1avZa9Bmr1h097mI5:OrpI1z4jyt5+0zavZangX097m

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

22500

C2

confisg.edge.skype.com

http://

s28bxcw.xyz

config.edgse.skype.com

http://89.43.107.7

Attributes
  • base_path

    /recycle/

  • build

    250249

  • exe_type

    loader

  • extension

    .alo

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2912-143-0x0000000002010000-0x00000000020A5000-memory.dmp
    .dll windows x86


    Headers

    Sections