General

  • Target

    1792-149-0x0000000000400000-0x000000000040E000-memory.dmp

  • Size

    56KB

  • MD5

    255b4d2782961894e2ca2adad89713d1

  • SHA1

    180667d8b2e2f4e420ad79f0c9a477c668a451e8

  • SHA256

    b6f927073a0809af0d42239647cf72e2dd6aa2405c40dab052f231a0b247bccd

  • SHA512

    39394e7877002c418fc5e7b47951d5aff98645f58871054f8a9bc22376f9d5798135a6b54ed39608f9d4cf1c9ba9cfda4c2739cdcf4b5ed6dffc564aac7c0886

  • SSDEEP

    768:undY7cymwFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:udY7cyjajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1792-149-0x0000000000400000-0x000000000040E000-memory.dmp
    .exe windows x86


    Headers

    Sections