General

  • Target

    3512-155-0x00000000008A0000-0x00000000008AE000-memory.dmp

  • Size

    56KB

  • MD5

    2c95056043b445dde441538b81ceb9ad

  • SHA1

    d2849ba82f53e4c1509a2f78eaf2435a2826f4d1

  • SHA256

    734de1cca18413c4e391f521c1a4a11ed4dd2257cd94cf527bded557debd0fc5

  • SHA512

    ed4f08ed15d8b4524e754c6e6a4f99e16fce4619b03897f58fb215d496815cb0ebb487d4a60984f5d26941d2e45a22659077b27fa3bb66bef0e695240fc708ec

  • SSDEEP

    768:cTpfQ3WHcxMFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:MBQ3WHc6ajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3512-155-0x00000000008A0000-0x00000000008AE000-memory.dmp
    .exe windows x86


    Headers

    Sections