General

  • Target

    4924-5-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • Sample

    231010-y9h88sbd45

  • MD5

    ab935084c0ec7e261e6eab28ddb2ebde

  • SHA1

    7ae5e4a3ca8015aeba97a6f73962a25b072bed42

  • SHA256

    a59fa32ae2faf9b568f1b6f21b25b4473f30c007e0de000218b22410e8f77a54

  • SHA512

    b40057bec2b170c85811bcc83a444f5a3984193863b3337326f5a9067b171adeb7762d18eeb738bd7decf305e60c80dd6f0eba3095c997e15488655b87d31dc2

  • SSDEEP

    768:iA3rPI5jShpW1vowlZjyY8Kl7aQixYgxYJmv0NHY7lbjNltdX20JC:B3rPI5jSu1tZjLVJaf3C7YJj3HG0JC

Score
10/10

Malware Config

Extracted

Family

gozi

Extracted

Family

gozi

Botnet

5050

C2

netsecurez.com

whofoxy.com

mimemoa.com

ntcgo.com

Attributes
  • base_path

    /jerry/

  • build

    250260

  • exe_type

    loader

  • extension

    .bob

  • server_id

    50

rsa_pubkey.plain
aes.plain

Targets

    • Target

      4924-5-0x0000000000400000-0x000000000040F000-memory.dmp

    • Size

      60KB

    • MD5

      ab935084c0ec7e261e6eab28ddb2ebde

    • SHA1

      7ae5e4a3ca8015aeba97a6f73962a25b072bed42

    • SHA256

      a59fa32ae2faf9b568f1b6f21b25b4473f30c007e0de000218b22410e8f77a54

    • SHA512

      b40057bec2b170c85811bcc83a444f5a3984193863b3337326f5a9067b171adeb7762d18eeb738bd7decf305e60c80dd6f0eba3095c997e15488655b87d31dc2

    • SSDEEP

      768:iA3rPI5jShpW1vowlZjyY8Kl7aQixYgxYJmv0NHY7lbjNltdX20JC:B3rPI5jSu1tZjLVJaf3C7YJj3HG0JC

    Score
    1/10

MITRE ATT&CK Matrix

Tasks