General

  • Target

    3600-210-0x0000000000D40000-0x0000000000D4E000-memory.dmp

  • Size

    56KB

  • MD5

    b17407434d61f9d6daf807999c967476

  • SHA1

    6bc4fb4d5a4fbd4d86ad0e4c2b90c6da0b398323

  • SHA256

    dcfe0c4b2972d0826001a8f720dac449e5a413569afce5a0c84d2932d62faeb3

  • SHA512

    847db8b74ac36b206d385b53e9edbcc0c1a44f929389af6237bd4312277246d2190e7bca4a3fafc1c0c4cb973f0cf40b7acc019991de789bee1a01b407f82724

  • SSDEEP

    768:/yzZALHgm8RFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:aVALHgmEajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3600-210-0x0000000000D40000-0x0000000000D4E000-memory.dmp
    .exe windows x86


    Headers

    Sections