Behavioral task
behavioral1
Sample
2780-57-0x0000000000220000-0x000000000022E000-memory.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2780-57-0x0000000000220000-0x000000000022E000-memory.dll
Resource
win10v2004-20230703-en
General
-
Target
2780-57-0x0000000000220000-0x000000000022E000-memory.dmp
-
Size
56KB
-
MD5
54b1e48bf92fea2b36e1f8072209cac4
-
SHA1
fdbb520abff2243479684c4b18d1606dbcbed19f
-
SHA256
1e77700d5d921221ab9b26dbf70d226e7f62ddfd6dcef73b705b57ed10218e88
-
SHA512
51271596ab690060fa9589114d75871c0018ccf618b7d89406c03bc493542f41a2cac0e5693b4b58f6652f692ceee8795864210f78dd9375dde1743bf1de3d88
-
SSDEEP
768:A2+WCU0YgGHvvyCofuFr8dluSHUv1oxU/Zom87E4fHA4sj3M4FVOZd43HmItv:YWF0YhntrFr4DU6x2JE3QJLs9Q
Malware Config
Extracted
gozi
Extracted
gozi
5050
https://config.edge.skype.com
157.254.195.117
91.215.85.172
-
base_path
/jerry/
-
build
250255
-
exe_type
loader
-
extension
.bob
-
server_id
50
Signatures
-
Gozi family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2780-57-0x0000000000220000-0x000000000022E000-memory.dmp
Files
-
2780-57-0x0000000000220000-0x000000000022E000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 6KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 1024B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 29KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ