General

  • Target

    3436-225-0x00000000001E0000-0x00000000001EE000-memory.dmp

  • Size

    56KB

  • MD5

    c673e2d4e2134d2c53064c35d23e195a

  • SHA1

    114b3e976b90e1eaa141474bd109d94363ef7ec3

  • SHA256

    6a66e5ace7bb68c66354f2b799778819602959f6397e694fdeb4689c11226871

  • SHA512

    a47c1be1893e992bb0a0c9ee7bb794ee2c09101d66b1f95efe014c295882c80a7221287e18d8da75cd6b2dda42f706ae0e62552e49edf82ed5d040b5498d6b39

  • SSDEEP

    768:9wlQajsPEoR4jInhpp55dWSlkiidEfUPJqBQPt04:92QaAlR4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3436-225-0x00000000001E0000-0x00000000001EE000-memory.dmp
    .exe windows x86


    Headers

    Sections