General

  • Target

    4924-153-0x0000000000790000-0x000000000079E000-memory.dmp

  • Size

    56KB

  • MD5

    2fa5476a008569fcecf6ed184bbd13fe

  • SHA1

    32cdb29d0f771ef695baab40e49bce5c8dc9b09a

  • SHA256

    c0fb292543cd1271439c5e1408064aeef4dadee8b6089c9da11043d525e6d770

  • SHA512

    a09eee9cde57db38fe22ed95631ff1bc80f8c20e4c7d20038da2fb45baaf982ab060b193f4eaac63aa76e2cfcd8f003ea7362c5fd5bc2a83b08f50f19051685b

  • SSDEEP

    768:TUocFFFKVA1FAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:T3cFFFKeajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4924-153-0x0000000000790000-0x000000000079E000-memory.dmp
    .exe windows x86


    Headers

    Sections