General

  • Target

    4272-146-0x0000000000380000-0x000000000038E000-memory.dmp

  • Size

    56KB

  • MD5

    256e163932fcc55e907268df375a6796

  • SHA1

    1ad271420175ca3d69dac376b3a50348219ea424

  • SHA256

    2540a4d1a9bb6f864a93318f12c839b62e7b4a0331e682a84549a985496cde22

  • SHA512

    9b2c6c1c5ea828addc4a6ffc3cdb1dc8ec8ab924353efe16ca52ed4000439a339a57ed14943d1462b3df0e401b2b0dbbb0171aeb8159e93678ce42ae0d78bde3

  • SSDEEP

    768:2PlYb0KjQUFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:2NYb0KjlajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4272-146-0x0000000000380000-0x000000000038E000-memory.dmp
    .exe windows x86


    Headers

    Sections