General

  • Target

    2600-19-0x0000000000400000-0x000000000228F000-memory.dmp

  • Size

    30.6MB

  • MD5

    fcfdd5335ff299856bc1470b997d391f

  • SHA1

    d0749c03790f11f6a8dcbc180b33a03c260f03e0

  • SHA256

    c7851fbc13eee867c939b47b5b618e467c748c1e2ce200450cb7dde8da88001f

  • SHA512

    edc56cc0b7adc72506d1a2ddf7fa55daeef2fe57a88a6123ae8ab29950b70f77121420576d0c4d0fd39596395cdc1a735911d1ba312bcb3cf3f02409ece95224

  • SSDEEP

    3072:WrPI5jSu10ZLaHZ5VYnurTt/nZAsaA6eRESzHxHH3zt8l7Mjd1s0ot:mu10ZLU7VYnuF/ZdaAnEqHxn3R82s0o

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

mifrutty.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Signatures

  • Gozi family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-19-0x0000000000400000-0x000000000228F000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections