General

  • Target

    1964-2-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • Sample

    231006-j7l5sahh9w

  • MD5

    11f084b59ba0b09257b9e46318dab816

  • SHA1

    e6eefd9f05bf3d655ed74009c8eb6da269a8a27b

  • SHA256

    91dd69f25f94275fcae5997a40f9081510aa5af41a9ac3f5d1f5eaebddda8d6c

  • SHA512

    413ecc9796fde7346965e821df42609db034252ba70d49a8e687b20240955b2750cb0364aa895865f89476bb377a953f59561d391361cf1a65317365812cfaa5

  • SSDEEP

    3072:WrPI5jSu1aZLaHZ5VYnurTt9epeDNbuSTTNG9AMY8q4LCvr4iZot:mu1aZLU7VYnuF9epeZTNG+MTasyo

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      1964-2-0x0000000000400000-0x000000000228F000-memory.dmp

    • Size

      30.6MB

    • MD5

      11f084b59ba0b09257b9e46318dab816

    • SHA1

      e6eefd9f05bf3d655ed74009c8eb6da269a8a27b

    • SHA256

      91dd69f25f94275fcae5997a40f9081510aa5af41a9ac3f5d1f5eaebddda8d6c

    • SHA512

      413ecc9796fde7346965e821df42609db034252ba70d49a8e687b20240955b2750cb0364aa895865f89476bb377a953f59561d391361cf1a65317365812cfaa5

    • SSDEEP

      3072:WrPI5jSu1aZLaHZ5VYnurTt9epeDNbuSTTNG9AMY8q4LCvr4iZot:mu1aZLU7VYnuF9epeZTNG+MTasyo

    Score
    3/10

MITRE ATT&CK Matrix

Tasks