General

  • Target

    1520-143-0x0000000000DC0000-0x0000000000DCE000-memory.dmp

  • Size

    56KB

  • MD5

    6d5e04d62acc6bc2944190f26503f871

  • SHA1

    5fd91b18d0902adcd99cd6d6a4c5a34c5869d5d4

  • SHA256

    42b190ddefe9e3677c3a64c46c2b31fe5430048b0e7df93200b900c1b4a04370

  • SHA512

    eaed52f8c18bd0a479749590dab5374907d3c34804d94aafa61428fed5175236bc6feb564899bee76d3c8e1d74b40774f963c19255a4646ec8030e354870dea6

  • SSDEEP

    768:SLRb8d9IutsFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:SVb8d9IuuajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1520-143-0x0000000000DC0000-0x0000000000DCE000-memory.dmp
    .exe windows x86


    Headers

    Sections