General

  • Target

    4160-146-0x00000000009C0000-0x00000000009CE000-memory.dmp

  • Size

    56KB

  • MD5

    69827e24c4b0b8fe19ad1a24e0070ec0

  • SHA1

    a645b544d2d703db514444975a0019ad145a1b6e

  • SHA256

    1a784eddbe48ca6330aa2b1908cdc0850cf2c4625a917833176ada6792f5d126

  • SHA512

    179c70eb359396f5ee17c432646d49aa36f49fc89c4cea3b1389487b01db2458428ceaca8a03aabfcf55d96a5ea03508da9e7b25429423091f458e7ac4fa482e

  • SSDEEP

    768:SLRwLIu1faFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:SVwLIu1yajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4160-146-0x00000000009C0000-0x00000000009CE000-memory.dmp
    .exe windows x86


    Headers

    Sections