General

  • Target

    3696-168-0x00000000007D0000-0x00000000007DE000-memory.dmp

  • Size

    56KB

  • MD5

    1e4250f90481c387e0a5b207f4dbb772

  • SHA1

    2a41fa89cfe04439f2b653b3c0d012fc676c71b7

  • SHA256

    d9a132c7b8c2091d1d1c29d498f82882e126837aabe8479fe5ec4621809efb0d

  • SHA512

    aa7c72d4e97cf400da8366468ffd150da26bd93f5aa7ca28f49223e543f46642a2a35ca5d6ba58f690461797c5e848b2a4bea856129fa74f1da099c3c4daab20

  • SSDEEP

    768:lDK/c+BDoR4jInhpp55dWSlkiidEfUPJqBQPt04:l+/c+aR4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 3696-168-0x00000000007D0000-0x00000000007DE000-memory.dmp
    .exe windows x86


    Headers

    Sections