General

  • Target

    2016-170-0x00000000004D0000-0x00000000004DE000-memory.dmp

  • Size

    56KB

  • MD5

    4072a197aae8eaddc1625796a4d3eb60

  • SHA1

    4f2e7869bafa869a43157d9d3b665a49a6e3d9a6

  • SHA256

    c088456634fe07e0f6c6c530583ba50b07664a55019573315cd78e2968a20207

  • SHA512

    0c703fdb924ea31a0e1aba27b485aebf8ce70893d12882a3bedea247887296ecbd25858fff1e4b3c04111e0c706c90e9fe1b254d939a55198314f283636aaf4c

  • SSDEEP

    768:lTaPcXu2KoR4jInhpp55dWSlkiidEfUPJqBQPt04:lePcewR4jaDtmiuqURq

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

1001

C2

https://checklist.skype.com

http://176.10.125.84

http://91.242.219.235

http://79.132.130.73

http://176.10.119.209

http://194.76.225.88

http://79.132.134.158

Attributes
  • base_path

    /microsoft/

  • build

    250256

  • exe_type

    loader

  • extension

    .acx

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

Files

  • 2016-170-0x00000000004D0000-0x00000000004DE000-memory.dmp
    .exe windows x86


    Headers

    Sections