Behavioral task
behavioral1
Sample
4264-135-0x0000000000400000-0x0000000002B9C000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4264-135-0x0000000000400000-0x0000000002B9C000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
4264-135-0x0000000000400000-0x0000000002B9C000-memory.dmp
-
Size
39.6MB
-
MD5
c10b083d29013ca71451d1da21a4ffd4
-
SHA1
32296756047f50a121f374d24d60a8f19fb9e4f4
-
SHA256
d55896aaf176e44f883d60cd0e86aea6da95614e332e154741aace0d3eccc5b4
-
SHA512
05ecf421a46545ffffc960c45b4e672e670d8484b3946e4f3708319698824690f9278be46f74efe7604b8dda8e42c3d4f69f8c66f67103ec3223365ef4c21fc6
-
SSDEEP
3072:SHLe0Pu/6gLT5LRdZn0Gl5lHDInOp00VMUwBNXYzBf6/OKmcTdKralbTl:Sre0PYZn9Zn0AQs0IMUwBNO6/Nlb
Malware Config
Extracted
gozi
Extracted
gozi
7702
checklist.skype.com
62.173.138.160
31.41.44.122
193.0.178.141
-
base_path
/drew/
-
build
250249
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Gozi family
Files
-
4264-135-0x0000000000400000-0x0000000002B9C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ