General

  • Target

    1640-146-0x0000000000BD0000-0x0000000000BDE000-memory.dmp

  • Size

    56KB

  • MD5

    61c1c5b3a0c9038ae3782e74a7a4694f

  • SHA1

    d9889ee6ac853b9a11e74b1c6d4148e5e8010827

  • SHA256

    e8ad6cf951c2c70b42b681b7158db3312db75dfd41dba0f80202eab2b7ca369f

  • SHA512

    9931f7f5c5dfde6e4421550216ceb0500ceb5bb17b0b9312171acad982aae6fcbfe310bcdfaa8ace17dcf5a551402fa985a94eef442392d6fc134fd7aa8ca891

  • SSDEEP

    768:HgEcVxRHOFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:HPcVxRuajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1640-146-0x0000000000BD0000-0x0000000000BDE000-memory.dmp
    .exe windows x86


    Headers

    Sections