General

  • Target

    4024-194-0x0000000000CF0000-0x0000000000CFE000-memory.dmp

  • Size

    56KB

  • Sample

    230217-c7mmzsdd73

  • MD5

    b2da092636e28fc9d53226c243b4cb90

  • SHA1

    300d6f31a02739f00d617ed855732202bd0ed25e

  • SHA256

    9e08b7cdc51c1051366d7785d45ece66954d8b9c3ca80f7c5bf6e862f3f8c2d4

  • SHA512

    d101b6486c8d905c2b3dc70adee0886caaa8dab154eebbfb89ec9e0390ba084e5555a86fc327e7f79957b3cb4b9d81f23f824ca21dcada0e3b301b1076d86e2c

  • SSDEEP

    768:JVYlnY32o4oR4jInhpp55dWSlkiidEfUPJqBQPt04:JKlY32oR4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      4024-194-0x0000000000CF0000-0x0000000000CFE000-memory.dmp

    • Size

      56KB

    • MD5

      b2da092636e28fc9d53226c243b4cb90

    • SHA1

      300d6f31a02739f00d617ed855732202bd0ed25e

    • SHA256

      9e08b7cdc51c1051366d7785d45ece66954d8b9c3ca80f7c5bf6e862f3f8c2d4

    • SHA512

      d101b6486c8d905c2b3dc70adee0886caaa8dab154eebbfb89ec9e0390ba084e5555a86fc327e7f79957b3cb4b9d81f23f824ca21dcada0e3b301b1076d86e2c

    • SSDEEP

      768:JVYlnY32o4oR4jInhpp55dWSlkiidEfUPJqBQPt04:JKlY32oR4jaDtmiuqURq

    Score
    3/10

MITRE ATT&CK Matrix

Tasks