General

  • Target

    2840-2-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • Sample

    231008-164f4saf75

  • MD5

    561f25541a2322153a733665e3bb823a

  • SHA1

    811e2dcce7ba90f3736490e4d6d2c6ebbf0f484d

  • SHA256

    226ba54dadf320cbd2e7421b9e8332edde625bb6e53e1ae37ad68060a7a807c1

  • SHA512

    c3af0b065fb048a0dc4c0ed3c54f530234b267732f938cf486067160ce3f718ea7e03a556376d369f9c6250386ac767b4a3c9d7a2ad0cc3506858596c3f17a69

  • SSDEEP

    3072:DrPI5jSu1aq2gfA4DqmtkY2j0eUnkrfPqU6xyhACMOTMrjAY:Du1aq2GJOmtMSnkrXq7qAgQr

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

185.247.184.139

62.72.33.155

incontroler.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      2840-2-0x0000000000400000-0x000000000228F000-memory.dmp

    • Size

      30.6MB

    • MD5

      561f25541a2322153a733665e3bb823a

    • SHA1

      811e2dcce7ba90f3736490e4d6d2c6ebbf0f484d

    • SHA256

      226ba54dadf320cbd2e7421b9e8332edde625bb6e53e1ae37ad68060a7a807c1

    • SHA512

      c3af0b065fb048a0dc4c0ed3c54f530234b267732f938cf486067160ce3f718ea7e03a556376d369f9c6250386ac767b4a3c9d7a2ad0cc3506858596c3f17a69

    • SSDEEP

      3072:DrPI5jSu1aq2gfA4DqmtkY2j0eUnkrfPqU6xyhACMOTMrjAY:Du1aq2GJOmtMSnkrXq7qAgQr

    Score
    3/10

MITRE ATT&CK Matrix

Tasks