General

  • Target

    3748-238-0x0000000000780000-0x000000000078E000-memory.dmp

  • Size

    56KB

  • MD5

    f77d566f37e6764c006c841027a8c936

  • SHA1

    f1a7632c653486dda7c1f7985c6de782c2a832e2

  • SHA256

    0d41c4aa7be270b63629c5cd2484b6440468cee2fa9c76c6ad291c6d90e778f2

  • SHA512

    cbb16a6fff28cad0b31257033757cc327df68c42869527ec320213bec1aa9f5a060b8006778da8a31a68d11b997dcefa8fb96c0baa7a0f681692138bacba4f39

  • SSDEEP

    768:R6LmWjsZ27oR4jInhpp55dWSlkiidEfUPJqBQPt04:RKmWjsZTR4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3748-238-0x0000000000780000-0x000000000078E000-memory.dmp
    .exe windows x86


    Headers

    Sections