General

  • Target

    4308-55-0x000001A738DD0000-0x000001A738E0D000-memory.dmp

  • Size

    244KB

  • Sample

    231006-ltxqgacf43

  • MD5

    d59cf35df082248013983074e8b93a19

  • SHA1

    6e68709ba55b6a212b584e0056111db3e59c8d94

  • SHA256

    3ea3d7c48b8e35aa64fc9e586deffcfccc668828348af76b4cadf15f17932a2e

  • SHA512

    3ad438718b88541852e169a38bed96d65abd8666789acbaed0f4f0d1963c1ee32762369233bc87ce86ef1645d4b246e88ec1f37b1c98d60f1aba8fe1a7e01f4e

  • SSDEEP

    3072:NXmwJT25VVeVqX++WldhnUaA4KT6ntfZFSumtYpFQrxlsx+XSTFCr5Icjbtc45Wt:NX72v82Wldh1KeRFSbaWrxlsx+r5D5G

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

systemcheck.top

Attributes
  • base_path

    /pictures/

  • exe_type

    worker

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    Tasks