General

  • Target

    3980-143-0x0000000000A50000-0x0000000000A5E000-memory.dmp

  • Size

    56KB

  • MD5

    84621b8dafa0fba6e1041ce768309745

  • SHA1

    9b6c1e0957880ef935111c9f29f59e8725cc492f

  • SHA256

    7c47e926cdad7415fda0350d889008ab368493a96764722861ce434e7eb2a3f2

  • SHA512

    102a3060edb3370e3c3e13be571987a2eb425479438f5aaabec7422c7c65188b9a6e12a3c1fbf55259c0e07b2f129da272d2fff4e78377ac2474ac2ca6789b03

  • SSDEEP

    768:fIcMlJZLGFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:ffMlJZSajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3980-143-0x0000000000A50000-0x0000000000A5E000-memory.dmp
    .exe windows x86


    Headers

    Sections