General
-
Target
320-2-0x0000000000400000-0x000000000228F000-memory.dmp
-
Size
30.6MB
-
Sample
231011-lchj8aff93
-
MD5
2b630efbe7c14b5cfc89b4863fef2459
-
SHA1
cfb48661b8bdfbc0ee9b6490ed436bc8e64e6010
-
SHA256
bbc3521fc489abf0b62621adcc8d34b86d6a06c8668719ca6394f703432cbe01
-
SHA512
788c5a5c81d5068af8f3fe1adaa0e0fe28f878940da86e7c880753961922404680e631e762de9ef94fd7ee419b9a3b48d02593a234c11255e4f2ca75b3e7524b
-
SSDEEP
3072:WrPI5jSu1kZLaHZ5VYnurTt9epeDNbuSTTNG9AMY8q4LCvr4cot:mu1kZLU7VYnuF9epeZTNG+MTasco
Behavioral task
behavioral1
Sample
320-2-0x0000000000400000-0x000000000228F000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
320-2-0x0000000000400000-0x000000000228F000-memory.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
gozi
Extracted
gozi
5050
mifrutty.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Targets
-
-
Target
320-2-0x0000000000400000-0x000000000228F000-memory.dmp
-
Size
30.6MB
-
MD5
2b630efbe7c14b5cfc89b4863fef2459
-
SHA1
cfb48661b8bdfbc0ee9b6490ed436bc8e64e6010
-
SHA256
bbc3521fc489abf0b62621adcc8d34b86d6a06c8668719ca6394f703432cbe01
-
SHA512
788c5a5c81d5068af8f3fe1adaa0e0fe28f878940da86e7c880753961922404680e631e762de9ef94fd7ee419b9a3b48d02593a234c11255e4f2ca75b3e7524b
-
SSDEEP
3072:WrPI5jSu1kZLaHZ5VYnurTt9epeDNbuSTTNG9AMY8q4LCvr4cot:mu1kZLU7VYnuF9epeZTNG+MTasco
Score3/10 -