General
-
Target
3192-193-0x0000000000180000-0x000000000018E000-memory.dmp
-
Size
56KB
-
Sample
230216-bzvg7aeg8s
-
MD5
1798def232406f04dfb77952a542c896
-
SHA1
0e9dcc35bf42364a41ca1ad7eec18e44a2c54356
-
SHA256
b1abfe60d2593975ea7e6128b3a540d6851d416f1430141a6a04e1618a7e499c
-
SHA512
7737cb73bc47fd7876f0f2003dcb8b26a0d927ffc03de20de1e5572f4819eaaa3195372846ba191d4c4c89aaf1d13d1d88bd3be7a7c49584d8b05ed6673fe950
-
SSDEEP
768:RarGJQsfroR4jInhpp55dWSlkiidEfUPJqBQPt04:RKGCskR4jaDtmiuqURq
Behavioral task
behavioral1
Sample
3192-193-0x0000000000180000-0x000000000018E000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3192-193-0x0000000000180000-0x000000000018E000-memory.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
gozi
Extracted
gozi
1001
https://checklist.skype.com
http://176.10.125.84
http://91.242.219.235
http://79.132.130.73
http://176.10.119.209
http://194.76.225.88
http://79.132.134.158
-
base_path
/microsoft/
-
build
250256
-
exe_type
loader
-
extension
.acx
-
server_id
50
Targets
-
-
Target
3192-193-0x0000000000180000-0x000000000018E000-memory.dmp
-
Size
56KB
-
MD5
1798def232406f04dfb77952a542c896
-
SHA1
0e9dcc35bf42364a41ca1ad7eec18e44a2c54356
-
SHA256
b1abfe60d2593975ea7e6128b3a540d6851d416f1430141a6a04e1618a7e499c
-
SHA512
7737cb73bc47fd7876f0f2003dcb8b26a0d927ffc03de20de1e5572f4819eaaa3195372846ba191d4c4c89aaf1d13d1d88bd3be7a7c49584d8b05ed6673fe950
-
SSDEEP
768:RarGJQsfroR4jInhpp55dWSlkiidEfUPJqBQPt04:RKGCskR4jaDtmiuqURq
Score3/10 -