General

  • Target

    4564-205-0x0000000000310000-0x000000000031E000-memory.dmp

  • Size

    56KB

  • MD5

    7fcd99a83b310b3e93837475ffeff749

  • SHA1

    b0d9c2bb01b4865086189b88b32d2aec0b462533

  • SHA256

    d1b60c2cb7a45768055f098877ba09bb3e39bf70131d2464143f417309a5dd06

  • SHA512

    886efaf05845113ebabcfedc4a4c284ca3d8cd54ec34ea10d19f41dbec0f3bea342b8bd31d0c51ad96462e2144714e6527b0b788af870dc4f6e6e3c0913d3eec

  • SSDEEP

    768:FfO7s2AxoR4jInhpp55dWSlkiidEfUPJqBQPt04:Fm7s23R4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 4564-205-0x0000000000310000-0x000000000031E000-memory.dmp
    .exe windows x86


    Headers

    Sections