General

  • Target

    1936-281-0x0000000000DC0000-0x0000000000DCE000-memory.dmp

  • Size

    56KB

  • MD5

    ce723e8951e57f1f806a6fdf8e31eac0

  • SHA1

    dba688fba62308667800ec4352aae4ccf172261a

  • SHA256

    bc182379ec8f11266909caf156ae6c79f7044687f1b9d92f1e270695aa5f4d80

  • SHA512

    12a2777e1cae70d175fd1bf181143438539fa8b2fe6112ad8586b8628a7634954cbf75abd2e9d0bf7c9cf96372eacc28f33e9c8bec7f99d78a80e3032997747b

  • SSDEEP

    768:xtSlPSSspfR4jInhpp55dWSlkiidEfUPJqBQPt04:xtSFSSs1R4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 1936-281-0x0000000000DC0000-0x0000000000DCE000-memory.dmp
    .exe windows x86


    Headers

    Sections