Behavioral task
behavioral1
Sample
1052-56-0x0000000000400000-0x0000000000562000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1052-56-0x0000000000400000-0x0000000000562000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1052-56-0x0000000000400000-0x0000000000562000-memory.dmp
-
Size
1.4MB
-
MD5
bcefc992c51b9d111e851e4df25bef8e
-
SHA1
c8a794c2d98122f3a7d87d0e851945ebcd0a0793
-
SHA256
be8f0e0b67502fe9b4948a82310beeae676e4aad9d228cbbcce020a10fb95b92
-
SHA512
e8061aed663417337d1da2befc9c252ce747402e615d17ca56ff00d536efd41c939d4d02d46a0cac8883617671a21a00111f00c5b802f97f22da98167da1cd88
-
SSDEEP
3072:gfKiS25zT94QeZDC2TW5eh5kbVWoNqnwl/X4I883AY0Qrc4JyI:OKiS25t27TclhL/N3B094V
Malware Config
Extracted
gozi
Extracted
gozi
7708
checklist.skype.com
62.173.147.156
31.41.44.3
46.8.19.140
45.151.232.3
62.173.139.21
185.142.99.47
31.41.44.121
-
base_path
/drew/
-
build
250255
-
exe_type
loader
-
extension
.jlk
-
server_id
50
Signatures
-
Gozi family
Files
-
1052-56-0x0000000000400000-0x0000000000562000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 404B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 735B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ