General

  • Target

    4664-147-0x0000000000650000-0x000000000065E000-memory.dmp

  • Size

    56KB

  • MD5

    7cb5146306c64fb81932a6db9673b8e8

  • SHA1

    2ab2b838d0c6880c5ed3e7c516fecd996805a3fe

  • SHA256

    bdf5c1f6e7532ba70ecc4b9fa1a3ce50409c3c73e51f8d4a2b2d935f87be1f39

  • SHA512

    cf23a8b1032e1c86f4d93144c3d5268972de765f6832b908f893837b29464234454dafae176e38d02fef8e27b8487d2ac778c74456e025f8a27c93182164dee6

  • SSDEEP

    768:FNIcMlJZBBFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:ffMlJZPajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4664-147-0x0000000000650000-0x000000000065E000-memory.dmp
    .exe windows x86


    Headers

    Sections