General

  • Target

    1456-3-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • Sample

    231007-mj5trsda96

  • MD5

    49ca5d57bad516cfc227ac9178099e2b

  • SHA1

    b57cff93cde033b8b0cbde78bb80fce909b733e5

  • SHA256

    ea62dfb2c76d8fc5456065ded42eac87625128b50c38968c3df2e9e9867dea5f

  • SHA512

    7cbf1823fe56520e67f33a78086d713b34d75882c6ecf90ae9e1b9607e88c76cd4c4b93037c2c45e949032ca36afad0b1c43af4e14bf6cbec18b7f43fac4ff24

  • SSDEEP

    3072:DrPI5jSu1aq2gfA4DqmtkY2j0eUnkrfPqU6xyhACMOTM+jAY:Du1aq2GJOmtMSnkrXq7qAgQ+

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

185.247.184.139

62.72.33.155

incontroler.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      1456-3-0x0000000000400000-0x000000000228F000-memory.dmp

    • Size

      30.6MB

    • MD5

      49ca5d57bad516cfc227ac9178099e2b

    • SHA1

      b57cff93cde033b8b0cbde78bb80fce909b733e5

    • SHA256

      ea62dfb2c76d8fc5456065ded42eac87625128b50c38968c3df2e9e9867dea5f

    • SHA512

      7cbf1823fe56520e67f33a78086d713b34d75882c6ecf90ae9e1b9607e88c76cd4c4b93037c2c45e949032ca36afad0b1c43af4e14bf6cbec18b7f43fac4ff24

    • SSDEEP

      3072:DrPI5jSu1aq2gfA4DqmtkY2j0eUnkrfPqU6xyhACMOTM+jAY:Du1aq2GJOmtMSnkrXq7qAgQ+

    Score
    3/10

MITRE ATT&CK Matrix

Tasks