General

  • Target

    2792-2-0x0000000000400000-0x000000000044A000-memory.dmp

  • Size

    296KB

  • Sample

    231010-2nekpsaa82

  • MD5

    035318cc8710b893e2e017dd180c1393

  • SHA1

    5a55a225fe6cdc98b17964484c6160c5e3f2f10a

  • SHA256

    d1902b23490bc819c1ac0653b140eb4961f4ad15674676d7ae52c583d08c186c

  • SHA512

    c9b4a295acdc771a28fadd76c0807c26c0cda376d54e753f0e98bbc0be526802fbfca9e8e959ed3f2f84801737292e149c809a11482425cd30d996b4d116cfbb

  • SSDEEP

    3072:erPI5jSu1325RgfA4D3xM4d76cPMjbz9nEDL2kYAs5cvWChTrDP:uu1m5RGJrxMo76cPM2DL2t+vWSTH

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

netsecurez.com

whofoxy.com

mimemoa.com

ntcgo.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      2792-2-0x0000000000400000-0x000000000044A000-memory.dmp

    • Size

      296KB

    • MD5

      035318cc8710b893e2e017dd180c1393

    • SHA1

      5a55a225fe6cdc98b17964484c6160c5e3f2f10a

    • SHA256

      d1902b23490bc819c1ac0653b140eb4961f4ad15674676d7ae52c583d08c186c

    • SHA512

      c9b4a295acdc771a28fadd76c0807c26c0cda376d54e753f0e98bbc0be526802fbfca9e8e959ed3f2f84801737292e149c809a11482425cd30d996b4d116cfbb

    • SSDEEP

      3072:erPI5jSu1325RgfA4D3xM4d76cPMjbz9nEDL2kYAs5cvWChTrDP:uu1m5RGJrxMo76cPM2DL2t+vWSTH

    Score
    3/10

MITRE ATT&CK Matrix

Tasks