General

  • Target

    3064-143-0x0000000000C60000-0x0000000000C6E000-memory.dmp

  • Size

    56KB

  • MD5

    a30acb0837b77af8d9c7a1961c2803ca

  • SHA1

    27c93d6c777d808f9e9e9f07deef94bbded019cc

  • SHA256

    7ad068a27142ad458e0d0ef419910f7452d00afea18c06c24633e88534dd0768

  • SHA512

    456c12deee5533a38449b3e16d97d6b0bb72d7547eb7f3b7ddbdb0bca129c58b0f5266f8386da98f8f4cb2b07224b050b59d08b3dcdcc7b3d9097ba5f05dd2ee

  • SSDEEP

    768:gtDIecC4bURjvZXQruFPu4akfiEmrNX11Uxfef+Sl:ghIecC4bIjvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3064-143-0x0000000000C60000-0x0000000000C6E000-memory.dmp
    .exe windows x86


    Headers

    Sections