General

  • Target

    1916-5-0x00000000000A0000-0x00000000000AF000-memory.dmp

  • Size

    60KB

  • MD5

    ba1c6c5d6e290aeebb8c29587a0d6b62

  • SHA1

    c35c493f0d3ddc0ec2e7b6cc37ada695e15f0e7c

  • SHA256

    d5ea353f8c2980d8c6ccc513a547d8909cf29942116de55e67bd13ca5e7ae8cf

  • SHA512

    11854812142be1f0fd42986ba6aa9d416a287d252a36f03f5fb2dc1e026dcab2a04d45a3427de36134ee38eb59f2c3df068eb3b59d7188f8a178b7ab35369c94

  • SSDEEP

    768:i+9rPI5JdclOuDl8xvbdwlZlyh8Kl7aQixYgxYJmv0NHY7lbI+gFfp:H9rPI5Jd7jWZliVJaf3C7YJI+ufp

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

http://iextrawebty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-5-0x00000000000A0000-0x00000000000AF000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections