General

  • Target

    4064-146-0x0000000000FF0000-0x0000000000FFE000-memory.dmp

  • Size

    56KB

  • MD5

    0380f6729dbcec7e394ff9ff00f7de0e

  • SHA1

    68c576ec4cf388a81dbb950698779b7d0bef1a11

  • SHA256

    f558330ade9d474458bfe5c7fb2e7803f0e82539146855bb495b3252844bf362

  • SHA512

    e3e19119aafc0721c0441db5f1b69bcebaa12b622d67c1fd6d5262008e6d1e92e44a24b9a3a159a31c73454313c2f653f606738affffe1eb3b11a4ef1dfaaaaa

  • SSDEEP

    768:NKGM9DjQg6FAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:N3M9DjkajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4064-146-0x0000000000FF0000-0x0000000000FFE000-memory.dmp
    .exe windows x86


    Headers

    Sections