General

  • Target

    2944-144-0x0000000000700000-0x000000000070E000-memory.dmp

  • Size

    56KB

  • MD5

    413503d905fe2ddb7842c4adf1036980

  • SHA1

    309ae0153fc4ec0347ba999889b6abab466790d5

  • SHA256

    fd7d1e051b03561293e7e274d205f5c62ac4d0062c3a9894b3fff89eb9eb4705

  • SHA512

    d65d7e7b7d2f778b582c3ca26e11f0d2f179a7f9c5720164b7985cbc8af7fcb3c1187457b81a8665479b005d33654ed24b59d73e9c0aa9bc5cfae5041518ede5

  • SSDEEP

    768:+XN4bsCa7OFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:+d4bsCTajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2944-144-0x0000000000700000-0x000000000070E000-memory.dmp
    .exe windows x86


    Headers

    Sections