General

  • Target

    4740-143-0x0000000000CE0000-0x0000000000CEE000-memory.dmp

  • Size

    56KB

  • MD5

    38cabac4a015dad6690a32e8664f0e07

  • SHA1

    e0f456be00f878d029f781e0f7ff47bc25020c64

  • SHA256

    ed9f8d9d6f0a318121ea7e27cd155046193960c313b2632ff157fa2d26421ef4

  • SHA512

    b977b201ba042864a7f32b6fdb34e3c9346af12fe6a5bcb546413a071de5e7f7cde12a364c373613999bdbcffb78f6c11ff4c72cc3b7e539ed1a3ba2b457b185

  • SSDEEP

    768:4V7OL/6gcmFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:4x4/6grajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4740-143-0x0000000000CE0000-0x0000000000CEE000-memory.dmp
    .exe windows x86


    Headers

    Sections