General

  • Target

    4420-282-0x00000000003E0000-0x00000000003EE000-memory.dmp

  • Size

    56KB

  • MD5

    64a6516ebc5745c5c4125c3fe4ebb4f4

  • SHA1

    9ced0091966ee551308aae21d7c06fcb0fc513de

  • SHA256

    f075ad035652544379e33efac99fd24577f35c43c633ca9205efd72d9a5e8df6

  • SHA512

    2b52ce22b69ab2ac212120b7fac06e47388fe34f5c3c96beaf9125963abdc5fb1c22333d93b3d69d7089bde8a2523ff8656f60c0da01b41c4669544f032f1e70

  • SSDEEP

    768:9QFwaAEPoR4jInhpp55dWSlkiidEfUPJqBQPt04:92waApR4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4420-282-0x00000000003E0000-0x00000000003EE000-memory.dmp
    .exe windows x86


    Headers

    Sections