General

  • Target

    2512-153-0x0000000000500000-0x000000000050E000-memory.dmp

  • Size

    56KB

  • MD5

    8fa9e6eb93e117f4764cd6e812c4b3cc

  • SHA1

    95affd7d5c391e3614633148e273be283920d190

  • SHA256

    e7eba811054de300bfe625bd773dac3f241ccff9c0ccac1361977f9a71e3d1f5

  • SHA512

    d9819b51ea1e4f5ed350674313588a9ba392d340b64a24e3c2b035173affb34c46cdead450cce47be0ed05f2559fb7bdce92812bd7d9e80f9d567efd75cf10e9

  • SSDEEP

    768:e3t4bMKpJqFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:ed4bMKpwajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2512-153-0x0000000000500000-0x000000000050E000-memory.dmp
    .exe windows x86


    Headers

    Sections