General

  • Target

    4696-146-0x00000000004E0000-0x00000000004EE000-memory.dmp

  • Size

    56KB

  • MD5

    f10bb82743eab6f434c3e38fb44d018e

  • SHA1

    484c5f81976f3594abe93d98976d840787e6e576

  • SHA256

    caa85c368eefe4a783b9e86be79fe4770f5b3b3d14dd670eda31fad7a2351dee

  • SHA512

    9a77aea10ac910acb11e2e42e2c7df1ab04cbd0aa11bacbee1562f58a62f30c5224df3f289fd49f5d346a1109a6096b5ad5fa5d82eb2d84f6c3c22f3227ff750

  • SSDEEP

    768:4V74/6gg5SFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:4x4/6ggcajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4696-146-0x00000000004E0000-0x00000000004EE000-memory.dmp
    .exe windows x86


    Headers

    Sections