General

  • Target

    3888-146-0x0000000000310000-0x000000000031E000-memory.dmp

  • Size

    56KB

  • MD5

    51e32605a47a877ddd2029c58d9b4fd6

  • SHA1

    862ae5a05ce3dccb38d5addf39d85364871ff91d

  • SHA256

    02834f4e43dc503696c3f40e37d6e43727f00d76df2095faec94f3b428d9e1c0

  • SHA512

    3124c95f439f302c3efff3016361a9c0a6209f36e8560337b3b7e9a6a2869dc8fbd2253e324a5890ef0025590500001d6cced20523b9732bdc2e8dc46b5f2bfc

  • SSDEEP

    768:bMwsVNdrBIFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:bXsVNdrKajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3888-146-0x0000000000310000-0x000000000031E000-memory.dmp
    .exe windows x86


    Headers

    Sections