General

  • Target

    4420-145-0x0000000000150000-0x000000000015E000-memory.dmp

  • Size

    56KB

  • MD5

    a1366c4533d24b80d7edbdb24f98b190

  • SHA1

    84bcb25e17d5f4e68714ab7d7dcc8f15d6c7bbeb

  • SHA256

    5ee8a45639e98953f0d5ef68c22bb78aa517ba780f0141a6fbc31da801e4d992

  • SHA512

    612e2d8afb9a5642454a8430a9be4ddf9cc5c6ec00bceda8e11747fef16a1f45bc6cddf036e12351b3a344c66e054c6557e30f87a3412ab54ac0ce656d8f5a76

  • SSDEEP

    768:P4Msl5J1UjvZXQruFPu4akfiEmrNX11Uxfef+Sl:Pfsl5JmjvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4420-145-0x0000000000150000-0x000000000015E000-memory.dmp
    .exe windows x86


    Headers

    Sections