General

  • Target

    gozi.payload-disk

  • Size

    44KB

  • MD5

    76f70e707144bb109d3e3e802cfaddb3

  • SHA1

    11223b8b61aed91d976242abe2d85103db8af2c1

  • SHA256

    07842c72a0b850aa90614e3f187037fc664b237cc70db0c59add6cd1f4c465de

  • SHA512

    7c224aab3c9f4b6e92fccdd2dc10cadbd69949e26b732141785ea48e1dedb914f30a73d31edec25456f85cc181b2b8aca06d6c44845ba1141548f8d4c7de5054

  • SSDEEP

    768:zX/rx/qCa8OmwxfhqwSJ9z7XdjP0lBdCEtDsh4eLiTL7gpP1ZXOTy:zvrx/qp8OmwxfhyVxQlBdvW4eLOL7eX7

Score
10/10

Malware Config

Extracted

Family

gozi

Botnet

5050

C2

http://iextrawebty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • gozi.payload-disk
    .dll windows:5 windows x86

    ef075d26b728b78a932306e24062e80c


    Headers

    Imports

    Sections