Behavioral task
behavioral1
Sample
1568-59-0x0000000000210000-0x000000000021E000-memory.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1568-59-0x0000000000210000-0x000000000021E000-memory.dll
Resource
win10v2004-20221111-en
General
-
Target
1568-59-0x0000000000210000-0x000000000021E000-memory.dmp
-
Size
56KB
-
MD5
fec4d9251019a2ffc849acddbb435df7
-
SHA1
002c4ed1fa6a0c6407f4e0bf01f5bd7dce59de43
-
SHA256
9732e602c8c83aa19ca2e1ca8bbc22f3997b55df996f199ab1b1c831d2b29e49
-
SHA512
8009b7eabc10caa221066c11e9006e079bbef0df5855fb2d85d4a20f9d687a3552755c3324dfcecbc3ac1502c36846db3b40c4715ba3db1b64e3b3d78c58ecfb
-
SSDEEP
1536:xYXi9DigKUZAHWciHqzv1PsLBU9jSRUwA:xY6DigKUZekHml9jSCw
Malware Config
Extracted
gozi
Extracted
gozi
7708
checklist.skype.com
185.31.160.197
31.41.44.76
194.116.163.130
-
base_path
/drew/
-
build
250255
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Gozi family
Files
-
1568-59-0x0000000000210000-0x000000000021E000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 604B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 735B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ