General

  • Target

    3080-289-0x0000000000990000-0x000000000099E000-memory.dmp

  • Size

    56KB

  • MD5

    0f602b9a93aa513d79f9d93c3fec5f6a

  • SHA1

    360c7851e58edeb282dd773039df72c16501ef36

  • SHA256

    0b90f12c8db244e190511c55b9b8e12d11b16a941f3a7b5be7b629151bee4b62

  • SHA512

    e1badd7df625636f1cee86dd0dd333ba7a2ccb7d44cfa7d6683d2e8133fb25d060887a587a1354c5d570c8ebb457243dcd98972b15b8624398ed0f8b59b89f44

  • SSDEEP

    768:FbTGzc26soR4jInhpp55dWSlkiidEfUPJqBQPt04:FWzc26R4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3080-289-0x0000000000990000-0x000000000099E000-memory.dmp
    .exe windows x86


    Headers

    Sections