Behavioral task
behavioral1
Sample
1124-56-0x0000000000400000-0x0000000002C4E000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1124-56-0x0000000000400000-0x0000000002C4E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1124-56-0x0000000000400000-0x0000000002C4E000-memory.dmp
-
Size
40.3MB
-
MD5
ac1b3336e0a439745bb46c6ece90fbba
-
SHA1
924598596031e93cd509299b2c96e00c8507ad7b
-
SHA256
152b636186d14cd4834df774d0d3195453630682d010092ee2f05c62492181ef
-
SHA512
86218f6e32de08a76b6b4fbf4d514dd8515d8b8769d13b7757057f96a4bd1bcf67c94ef8704b8aa68f5d09fd5c7919ff0a865557317728a029312ad983e07d7f
-
SSDEEP
6144:6eWr+fBar8L80cRNzdND/XQQbpajooxupmLUsjT:6eWr+Y4LNcR1dND/5bpajooxupmL
Malware Config
Extracted
gozi
Extracted
gozi
7701
checklist.skype.com
62.173.145.223
31.41.44.105
45.89.66.58
-
base_path
/drew/
-
build
250249
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Gozi family
Files
-
1124-56-0x0000000000400000-0x0000000002C4E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ