General
-
Target
4308-55-0x000001A738DD0000-0x000001A738E0D000-memory.dmp
-
Size
244KB
-
Sample
231006-ltxqgacf43
-
MD5
d59cf35df082248013983074e8b93a19
-
SHA1
6e68709ba55b6a212b584e0056111db3e59c8d94
-
SHA256
3ea3d7c48b8e35aa64fc9e586deffcfccc668828348af76b4cadf15f17932a2e
-
SHA512
3ad438718b88541852e169a38bed96d65abd8666789acbaed0f4f0d1963c1ee32762369233bc87ce86ef1645d4b246e88ec1f37b1c98d60f1aba8fe1a7e01f4e
-
SSDEEP
3072:NXmwJT25VVeVqX++WldhnUaA4KT6ntfZFSumtYpFQrxlsx+XSTFCr5Icjbtc45Wt:NX72v82Wldh1KeRFSbaWrxlsx+r5D5G
Malware Config
Extracted
Family
gozi
Botnet
5050
C2
mifrutty.com
systemcheck.top
Attributes
-
base_path
/pictures/
-
exe_type
worker
-
extension
.bob
-
server_id
50
rsa_pubkey.plain
aes.plain