General
-
Target
3496-5-0x0000000000400000-0x000000000040F000-memory.dmp
-
Size
60KB
-
Sample
231001-ekl42sac95
-
MD5
baa2b43a743b1e8ec926df133f92c5fe
-
SHA1
ddc47fd0f7dc9c258c532368def681929a7e05d8
-
SHA256
279dd5c808ada0c8757c8e70f32d11d0281204c80fe518db27ee4ea43dc0572c
-
SHA512
640bd2653452f281aeab3af71d18b678f2bb364381bb9f7ff2c1f3f651d07002f8a2557442299e754cb043a13b85aaf839a453146f4280dd94cbca8e4d82742b
-
SSDEEP
768:iA3rPI5jShpW1v12wlZjyY8Kl7aQixYgxYJmv0NHY7lbjNltdX20JC:B3rPI5jSu1xZjLVJaf3C7YJj3HG0JC
Behavioral task
behavioral1
Sample
3496-5-0x0000000000400000-0x000000000040F000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3496-5-0x0000000000400000-0x000000000040F000-memory.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
gozi
Extracted
gozi
5050
netsecurez.com
whofoxy.com
mimemoa.com
ntcgo.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Targets
-
-
Target
3496-5-0x0000000000400000-0x000000000040F000-memory.dmp
-
Size
60KB
-
MD5
baa2b43a743b1e8ec926df133f92c5fe
-
SHA1
ddc47fd0f7dc9c258c532368def681929a7e05d8
-
SHA256
279dd5c808ada0c8757c8e70f32d11d0281204c80fe518db27ee4ea43dc0572c
-
SHA512
640bd2653452f281aeab3af71d18b678f2bb364381bb9f7ff2c1f3f651d07002f8a2557442299e754cb043a13b85aaf839a453146f4280dd94cbca8e4d82742b
-
SSDEEP
768:iA3rPI5jShpW1v12wlZjyY8Kl7aQixYgxYJmv0NHY7lbjNltdX20JC:B3rPI5jSu1xZjLVJaf3C7YJj3HG0JC
Score1/10 -