General

  • Target

    1296-153-0x0000000000870000-0x000000000087E000-memory.dmp

  • Size

    56KB

  • MD5

    f2a7108b7990304b943bd41a5db2d6dd

  • SHA1

    bfe86282be49f8740d11f3601398af5f0fa08b93

  • SHA256

    9e912e9bd432f6798a59b66dbe24c457b2a6db15fd952562f385449d6e30375f

  • SHA512

    7b842e2f283727047737c409fde6c858febb0ecba373d9a16e4c7c569c02230423d05dc16d3d138e8541e7c034a6ca029934c72a09ffe4b180f9b52c2e97a763

  • SSDEEP

    768:UIi+MdrLFIFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:FnMdrL6ajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1296-153-0x0000000000870000-0x000000000087E000-memory.dmp
    .exe windows x86


    Headers

    Sections