General

  • Target

    1456-3-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • MD5

    49ca5d57bad516cfc227ac9178099e2b

  • SHA1

    b57cff93cde033b8b0cbde78bb80fce909b733e5

  • SHA256

    ea62dfb2c76d8fc5456065ded42eac87625128b50c38968c3df2e9e9867dea5f

  • SHA512

    7cbf1823fe56520e67f33a78086d713b34d75882c6ecf90ae9e1b9607e88c76cd4c4b93037c2c45e949032ca36afad0b1c43af4e14bf6cbec18b7f43fac4ff24

  • SSDEEP

    3072:DrPI5jSu1aq2gfA4DqmtkY2j0eUnkrfPqU6xyhACMOTM+jAY:Du1aq2GJOmtMSnkrXq7qAgQ+

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

185.247.184.139

62.72.33.155

incontroler.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1456-3-0x0000000000400000-0x000000000228F000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections