General

  • Target

    3360-143-0x0000000000430000-0x000000000043E000-memory.dmp

  • Size

    56KB

  • MD5

    2ee3fd0599f9eec9dfee880df39789eb

  • SHA1

    2570bddcb55a9b7cb822408b23f59dc5a891941d

  • SHA256

    c708ce99fb0efae1a376de4b63fcad865e4adb0c745d55222c88efef7e6c6d19

  • SHA512

    dfbe70c330edf1a2b0db2918eb7e14384fdf0167aeaf4bc8e6e508bf17c8ab9bb9671abdf5b8ea6054b7afd10a9d46dc5f88b9d0b3d75d67a62b740a675a87ca

  • SSDEEP

    768:h2ictPP9EFAjvZXQruFPu4akfiEmrNX11Uxfef+Sl:hPctPPqajvjJak6HUfI

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    260255

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3360-143-0x0000000000430000-0x000000000043E000-memory.dmp
    .exe windows x86


    Headers

    Sections