General

  • Target

    788-143-0x0000000000B40000-0x0000000000B4E000-memory.dmp

  • Size

    56KB

  • MD5

    e260f59ab7872f824654bd9ac323fe2a

  • SHA1

    cdd3f7709fb5c6cf31c436d1321ff66829103ee0

  • SHA256

    b3cccfb38122ce923e11cae2a495f9629df284682d1452087ade71be79f83a4d

  • SHA512

    734e1bf6104bf0973d1392e2c9c13d1fedb98d05061aa8b47bcabd7b97967d31897a14666364a77baf27a7c7bddf5be5b30041e725253cf2397151feb7a0d454

  • SSDEEP

    768:+DT5ALgGXTFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:+DVALgGDajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 788-143-0x0000000000B40000-0x0000000000B4E000-memory.dmp
    .exe windows x86


    Headers

    Sections