General

  • Target

    2460-2-0x0000000000400000-0x0000000002290000-memory.dmp

  • Size

    30.6MB

  • Sample

    231008-b5rngsbf98

  • MD5

    a4ecb22204a83ab128fa42ea63b011c7

  • SHA1

    05d9e45384ce2527168f8c5fb9f508664c394fb2

  • SHA256

    d2dd70bdd582ce40d066f4da7da104b94621f11658f5593f33a896a20d2404ab

  • SHA512

    4e50e85c34a36ec557cf7463c90e8dbce9e8a7f3cc19ef69bfc0aea9f346df307fd0cc087ec58344b3110bbea1cd6c90e572de6f82a2b11853d06eadf12fe899

  • SSDEEP

    3072:DrPI5jSu1cq2gfA4DCg9IGkpt4fMlw5mlg9eidid74+VONSRrCS:Du1cq2GJug9PkUf55B++Wr

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

185.247.184.139

62.72.33.155

incontroler.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      2460-2-0x0000000000400000-0x0000000002290000-memory.dmp

    • Size

      30.6MB

    • MD5

      a4ecb22204a83ab128fa42ea63b011c7

    • SHA1

      05d9e45384ce2527168f8c5fb9f508664c394fb2

    • SHA256

      d2dd70bdd582ce40d066f4da7da104b94621f11658f5593f33a896a20d2404ab

    • SHA512

      4e50e85c34a36ec557cf7463c90e8dbce9e8a7f3cc19ef69bfc0aea9f346df307fd0cc087ec58344b3110bbea1cd6c90e572de6f82a2b11853d06eadf12fe899

    • SSDEEP

      3072:DrPI5jSu1cq2gfA4DCg9IGkpt4fMlw5mlg9eidid74+VONSRrCS:Du1cq2GJug9PkUf55B++Wr

    Score
    3/10

MITRE ATT&CK Matrix

Tasks